IT Trenches:

policy enforcement


August 27, 2010  5:49 PM

Did you see this? – Microsoft updates Security Compliance Management Accelerator toolkit



Posted by: Troy Tate
Data security, DataCenter, design, Metrics, Microsoft Windows, Monitoring, policy enforcement, reporting, Security, tools

In 2008, I blogged about Microsoft's release of Security Compliance Management Accelerator toolkit. Now two years later Microsoft...

February 11, 2009  8:08 PM

Tracking down that user/computer that locks AD accounts



Posted by: Troy Tate
account management, Active Directory, AD, administration, analysis, anti-virus, antivirus, Data security, diagnostics, howto, information security, malicious activity, malware, Microsoft, Microsoft Windows, network security, Password, password management, policy enforcement, reporting, risk, risks, scanning, search, Security, security notification, tools, troubleshooting, Windows

With an environment spanning 18+ sites and more than 3000 computers around the globe, you could understand how challenging it would be to track down what device/user might be locking user accounts. There are tools out there that you can pay for that can help do this. However, Microsoft has some...


December 3, 2008  8:58 PM

Did you see this? – Windows Powershell Scriptomatic tool



Posted by: Troy Tate
administration, Microsoft, Microsoft Windows, policy enforcement, Powershell, reporting, toolkit, tools

A new utility that writes Windows PowerShell scripts that harness the power of WMI (Windows Instrumentation Management) for use in system management and administration. This tool was created by Microsoft consultant and...


October 9, 2008  3:00 PM

Alternatives to e-mail attachments – SharePoint is risky!



Posted by: Troy Tate
administration, Data security, DataManagement, design, email, Exchange, Firewalls, intellectual property, Networking, Policy, policy enforcement, risk, Security, SharePoint, Storage, vulnerability, website

I'm looking for some help on this topic and have posted a question to the ITKE community. Hopefully someone out there has had some experience with this service for your...


September 11, 2008  4:36 PM

RANT: Am I responsible for training technology staff at other companies?



Posted by: Troy Tate
administration, awareness, blog, CIO, Data security, DataCenter, DataManagement, design, Firewalls, Networking, Policy, policy enforcement, risk, Security, WAN

You may have seen in one of my past blog posts that we relocated a site over a weekend. As a result of that move we are continuing to clean-up various network access issues for...


September 2, 2008  6:22 PM

Operation Sentinel – Manhattan becomes “Big Brother”



Posted by: Troy Tate
awareness, blog, Data security, dhs, homeland security, Monitoring, Policy, policy enforcement, Security

Hopefully you have read my previous blog entry about IT Equipment Search & Seizure at US Borders. Well, if that is not enough to make you think Big Brother is here...


August 21, 2008  8:08 PM

IT Equipment search & seizure at the US borders



Posted by: Troy Tate
administration, awareness, blog, CIO, data loss, Data security, DataManagement, design, forensics, government, intellectual property, internet, IT education, Mobile, Monitoring, Networking, online identity, Policy, policy enforcement, reporting, research, risk, Security, WAN

I have recently been hearing some rumblings about this issue. I work for a firm with international locations and have travelled out of the country myself. So, this is a personal issue. What I am referring to is the situation described in this article by David Jonas of The Transnational:


August 20, 2008  6:19 PM

Did you see this? – Need some Exchange advice/support



Posted by: Troy Tate
administration, anti-virus, awareness, blog, CA, certificate authority, CIO, DataCenter, DataManagement, design, digital signatures, email, Exchange, Exchange 2007, howto, Microsoft Windows, Outlook Web Access, OWA, Performance, Policy, policy enforcement, Powershell, RSS, spam, toolkit, tools, web, website, wiki, WWW

Maybe you have already read my post about implementing new Exchange 2007 mailboxes for over 2000 users. If not... look here. So, as you see from this event, ongoing support...


August 14, 2008  2:58 AM

Managing risk & vulnerability



Posted by: Troy Tate
administration, antivirus, awareness, CIO, Data security, DataCenter, DataManagement, design, forensics, honeypot, IT education, malware, Monitoring, Policy, policy enforcement, risk, Security, vulnerability

Jotting some quick thoughts here after answering a user post. Thought I would place the same information here for all to see. This list is by no means complete and your thoughts are always welcome. Some ways to measure risk include: How valuable is the asset? How much of a threat...


July 25, 2008  12:58 PM

I know who I am – Do you know my name?



Posted by: Troy Tate
administration, awareness, blogging, Browsers, Database, DataCenter, DataManagement, design, Development, email, Exchange, Exchange 2007, howto, internet, Microsoft Windows, online identity, Policy, policy enforcement, reporting, research, Security, subscriptions, troubleshooting, website, wiki, WWW

If you read my previous post then you know we recently went through a major e-mail system migration. Part of that e-mail migration included moving from various naming...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: