Among my many areas of responsibility at work, is contacting all the users found in various data breach lists that our InfoSec team get their hands on (typically, these are the same lists that eventually make their way to HIBP). Not unsurprisingly, there is a significant amount of overlap between some of these lists, and one of the things I do is to ensure that I do not contact users about passwords I’ve already talked to them about.
(more…)Blog
-
Installing RSAT on a Windows client
You may, for one reason or another, need to install Remote Server Administration Tools (RSAT) on your Windows client computer. You may want to perform administrative tasks in Active Directory Users and Computers, administer Certificates in Active Directory Certificate Services, or administer DNS or DHCP in DNS or DHCP Server Tools.
(more…) -
GMail: Schedule sending of emails
From time to time, I have found it useful to schedule the sending of emails, such as reminders to others about something, requests for updates and so on. Luckily, this is a feature which is easily available in GMail.
(more…) -
Change is high-risk behavior. Nevertheless, it must be done
Change is arguably one of the riskiest behaviors within IT. Whenever we make a change, things tend to break. It is in no way coincidental that one of the foci of change management is post-change incidents, i.e. the errors introduced by the changes we make. I would go so far as to say that the only thing associated with higher risk than change is not changing.
(more…) -
View message headers
For most users, the message headers of any given email are irrelevant; the email has arrived, and that is all there is to say about that. It does, however, have applications both in IT support and in information security. While those applications are outside the scope of this article, accessing the message header is not.
(more…) -
Reviewed: reMarkable
Despite being very much a citizen of the digital world, I am a long-time lover of hand-written notes. I read and annotate reports, and prefer doing so with pen in hand. As such, I suppose it was inevitable that I would find and try out the reMarkable. Their ad blurb says:
(more…) -
Quickly check user logon time
With surprising regularity, I need to check when a user last logged in. I recently found a command that returns this information;
(more…)quser
. Using it is simple enough; open a command prompt, enter the command, and hit return: -
No-win scenarios are a part of life
I have been a fan of Star Trek since I first saw “Encounter at Farpoint” something like thirty years ago. The combination of curiosity, science fiction, and a society to which I believe we would do well to aspire genuinely makes me happy. Although I wouldn’t claim that all of Trek is good (but rather that there is a fair amount of schlock in Trek), I enjoy it a lot.
(more…) -
AD: Change UPN
Depending on how things are being run, you may need to change the UPN (User Principal Name) of individual users in your Active Directory. One reason for doing so is to use a hybrid local/Azure AD setup, where users use their email address for logging on to Azure, but their ordinary username to log on to the local domain. At any rate, here’s how to change the UPN of an individual user in Microsoft Active Directory:
(more…) -
Documentation – What kind of platform?
I believe very strongly in the power of documentation, for a number of reasons. Knowledge should be kept in an ordered manner, and writing documentation is a good way of not only ordering the knowledge, but double-checking it. In addition, by placing the documentation somewhere accessible, you can share it.
(more…)