Citrix – Improving Internet Explorer user experience

I assume if you are reading this you are tired of seeing Internet Explorer eat up CPU cycles on your Citrix farm, hurting other users experience. I usually prefer to keep the browser out of the Citrix Session for security reasons, however in some cases this is not possible. First thing I would recommend is… Continue Reading

Simple fixes to Ransomware in Windows Server environments

If you support a Microsoft Windows Server environment and are looking for some simple strategies to protect against Ransomware, you should consider the following:   DNS filtering services such as Zscaler and ThreatSTOP. Removing Local Admin rights from your users. Implementing File Server Resource Manager on your file servers and creating a file screen to… Continue Reading

ServiceDesk Plus issue with SSO

This one made me almost give up today… Manage Engine Service Desk Plus was prompting the user intermittently when SSO was enabled. In case any of my readers run into this issue after an upgrade, create a new computer account and use a name shorter than 12 characters…   UGH

Fixed: Windows 2008 server “No logon Servers Available”

This was a strange issue, usually resolved with a reboot. The server would not process jobs that were scheduled and when we tried to RDP, it would say ” No logon servers available” The issue was unrelated to Kerberos or time settings, instead it was an exhaustion of available ports to communicate with the domain…. Continue Reading

Tool for analyzing and comparing sets of Group Policy Objects (GPOs).

If you are like me, you are often asked to consolidate Group Policies and validate the existing policies for best practices and duplications that can lead to policy failure. I ran across this tool recently and thought I would share. According to Microsoft: Policy Analyzer is a utility for analyzing and comparing sets of Group… Continue Reading

Apache Struts2 Vendor bulletins

Every time there is a critical vulnerability that is discovered, I often get the question “how am I impacted?” The challenge is this, even if you have a vulnerability management toolset (Nessus, Qualys etc) you may not see the entire picture of what is impacted. There could be many reasons for this such as permissions… Continue Reading

HOWTO: Determine if an Office Update is installed on Win7

Previously, I would check the following registry location for Office updates: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall There are entries something like: {90140000-0011-0000-0000-0000000FF1CE} I would then use a reporting tool to look for this to identify where office updates are installed. (LANSWEEPER is a great tool for this kind of reporting) Recently I needed to do this for an Office… Continue Reading

Blatant promotional post: Patch and Vulnerability Management as a service

NETSYNTROPY – Mission statement: Our goal is to provide a complete simple to implement solution to solve for information security. Many large companies have security operations centers, an operational security response team, with large budgets and many layers of process, technology and end user training. At NETSyntropy we aim to provide a combination of information… Continue Reading