@nadnerb said in Ransomware Isn't the Problem, IT Departments Are:
meatware being meatware
@nadnerb said in Ransomware Isn't the Problem, IT Departments Are:
meatware being meatware
@voip_n00b said in Proxmox VE 7.0 Released:
@jaredbusch yes
Mark one product off of the options list....
If the business had this system that was their bread and butter, that is going to cost so much money and time to ensure doesn't go offline, and they still let it happen.
Then this is entirely the businesses fault and stop supporting stupid fucking decisions..... like trying to get a 2003 Server to P2V and continue running it.
There was certainly virtualization options back 6 years ago, hell I moved 3 organizations to completely virtual within that time span...
@eleceng At this point you're probably fucked, someone may have a 2003 server key lying around but that isn't a long term solution.
I'd cut my losses and move to a new OS and simply export whatever data is on the drives.
How long has Server 2003 been EOL'd, 6 years? And this system was still physical until very recently. . .
Sunk cost fallacy here, there can't be that much value in this server to offset the cost of just moving to a new platform.
If you can host it yourself, I know @scottalanmiller is running Tactical RMM, I assume all of NTG is using it, globally.
Could save you some long term costs if you can manage and support it yourself.
@gjacobse said in WinRM: Security Question:
@eddiejennings said in WinRM: Security Question:
@gjacobse said in WinRM: Security Question:
Here, it's turned off by design as a security risk, which to some degree I can see and agree with, but now I'll have to annoy users and in some cases drive across town to perform a minor task I could have done with PS.
What's the specific risk?
Well - that is my question and I don't know that I will get any more of an answer other than:
"Remote Powershell execution"
I feel as if I had a tool in the box and it's been welded so it can't be used.
WinRM in and of itself could of course be used for malicious intent. But so can Manage Engine or any other remote management tool. Someone picked WinRM and said "No" because they don't know how it works or how to secure the environment from abuse.
@hobbit666 said in Spreadsheet background image:
@gjacobse said in Spreadsheet background image:
How often do you need to do this?
Not often at the moment, it's only really for diagnosis of boards when I need help
Just thought it would be a nice way of putting the data on to share.
Try ShareX (It is Windows Only though) but it works amazingly well. Best screenshot tool I've used and has a ton of functionality without the complexity.
The only thing I do at install is disable the "Uploading" of images (which it asks the first time anyways).
@flaxking said in Checking multiple Directories to confirm all files are identical:
I would think you would be able to use robocopy to do a diff
Probably, but the issue still comes down to system resources.
Anything that is storing in memory will quickly consume the available resources.
Maybe if I pipe the about to a file it won't be so bad..
@dashrender said in Checking multiple Directories to confirm all files are identical:
One thought - run a md5 hash and output filename date hash to a file, then compare the contents of the files between the servers.
you could run the job individually on each server so all three plus devices could run at once - assuming not all on the same VM host.
This appears to be working, thanks for the idea!
dir D:\Files -Recurse | Get-FileHash -ea Continue > C:\D-Files.txt
Dumps out one large file, I could then use a file comparison tool to quickly check these outputs.
@dashrender said in Checking multiple Directories to confirm all files are identical:
@dustinb3403 You'll likely have to do some type of line fixup, i.e. if a file is missing, then every line after that would be a mismatch...
Maybe, Meld has actually been pretty good about that type of "issue" and can find the record anyways.
Has anyone had to do something like this? With the recent PrintNightmare vulnerability, we're obviously patching our systems, but we're also implementing some changes via GPO to force trusted print servers to be used, only.
What I am trying to sort out is a way to scan every system in a domain and see if it has a printer that is shared, specifically systems without the Printer sharing role installed (workstations, random servers etc).
This is a very rough hit for what I have, so I'm not sure if it actually would work. When I run it I'm getting a quota violation.
Import-Module ActiveDirectory
$comp = Get-ADComputer -Filter 'ObjectClass -eq "Computer"' | select -ExpandProperty DNSHostName
Get-Printer -ComputerName -Filter $comp | where Shared -eq $True
@pete-s I guess, still seems like "participation trophies". I'm at the point where I'd rather just have the cash or time off and not deal with this kind of game.
@pete-s said in POTS EOL?:
@dashrender said in POTS EOL?:
uh - whats IP? VOIP is IP, does it really matter if you have an ATA in the picture?
Hell, yes it matters. Alarm systems may dial the central with DTMF tones but when they start communicating it's a totally different ballgame.
If voip could transfer all the analog audio signals exactly as they appear without any jitter or compression then it would work flawlessly. But that is not how voip works.
You still have these issues with traditional POTS though too, except that the systems that used these POTS services understood and could deal with the issue.
@fredtx said in Did I connect these switches according to best practices?:
@scottalanmiller said in Did I connect these switches according to best practices?:
Is there a need for all the switches? I thought that you were reducing by one?
The one I reduced was the EdgeSwitch Lite, because it didn't have POE capability.
Isn't the edge the newest piece of equipment?
Router ---- edge (for non Poe stuff) ---- meraki for everything else
The question that hasn't been asked is how many ports does the customer use? 100 devices, but those aren't all on the LAN over Ethernet, right?
@dbeato said in MS O365 Autodiscovery: Failing:
@dustinb3403 What do you mean disabling autodiscover for a user? Are you talking about a registry key?
No, within O365 you can either selectively disable authentication protocols because you're a glutton for punishment or you can do so with conditional access policies or Security Defaults.
@iroal said in Booking dining room O365.:
Due to Covid, we have limited access in the office dining room.
The dining room allows 10 people simultaneously.
My idea is to create a room, or resource, in O365, that allows an occupancy of 10 people, but that can be reserved by 10 different employees. I don't want an employee to be able to reserve all 10 seats in the room.
O365 or Outlook allow this?
Thanks.
That's not really how resource scheduling works, you be better off having 10 individual resources which can be booked simultaneously, rather than 1 large resource.
@pete-s said in Remote control with buttons?:
@dustinb3403 said in Remote control with buttons?:
The end goal is to use it as a mouse? Do the buttons need to be programable?
No, no mouse function needed. The end goal is to use it to trigger macros.
So ideally programmable buttons or if the remote generates keys that can be picked up by another software.
I'd honestly look at a programmable compact mouse for this..
I've not seen any decent devices for this type of use before (that weren't ultimately mice)
From time to time you'll want to remove an application from your system (say from the Windows App Store) that has appeared on your system without you knowing why, when or how.
You could of course use the Microsoft App store to do this, but who wants to open that nightmare....
Here's how you can find and remove an application (package) from Windows using PowerShell.
$Bloat = Read-Host -Prompt "Supply at least a partial name of the app to remove"
Get-AppxPackage -AllUsers | Where-Object {$_.name -Like "*$Bloat*"} | Select Name, InstallLocation
Get-AppxPackage -AllUsers | Where-Object {$_.name -Like "*$Bloat*"} | Remove-AppxPackage
In my case I wanted to remove some new HP Application called JumpStarts which installed over the evening hours.
Using the above, you'll be prompted for the App name (title bar) or some portion of it so you can search for it, and then PowerShell will remove the application.
This will remove things that don't appear in Add and Remove Programs (Appwiz.cpl).
If you want to uninstall applications that are in Add and Remove Programs you can use this (I haven't refined it as much yet as I was just getting it sorted out)
$SEARCH = 'Advanced IP Scanner 2.5'
$RESULT =$INSTALLED | ?{ $_.DisplayName -ne $null } | Where-Object {$_.DisplayName -match $search }
$RESULT
if ($RESULT.uninstallstring -like "msiexec*") {
$ARGS=(($RESULT.UninstallString -split ' ')[1] -replace '/I','/X ') + ' /q'
Start-Process msiexec.exe -ArgumentList $ARGS -Wait
} else {
Start-Process $RESULT.UninstallString -Wait
}