• Viewing specific security policies that apply to active directory 2003 user?

    How can I show the security policies that are being applied to a specific Active Directory user or computer? Can I compare them to other users?

    NewnanIT1,110 pointsBadges:
  • Exporting Active Directory user info to CSV

    Can we export all of our AD data to a CSV file for backup purposes? Can we export the passwords as well? Will they  be encrypted? Where can we find the encryption key so we can make heads or tales of them.

    Karl Gechlik9,860 pointsBadges:
  • How can I secure a Windows XP workstation that is open to port 80 and hosting a website using IIS

    How can I secure a Windows XP workstation that is open to port 80 and hosting a website using IIS? The box is on the DMZ of our firewall for the time being. We will probably move it inside the firewall and open port 80 to it shortly.

    Karl Gechlik9,860 pointsBadges:
  • Making Joomla public. Concerns and options.

    We have an internal Joomla website. We want to make it public to the Internet. What security precautions need to be taken? What do we need to make it public? We are running this on IIS off of a Win 2003 Server.

    Karl Gechlik9,860 pointsBadges:
  • Is there an AS400 command to extract user profile information for production environment only?

    I need a user profile list for as400 user in the production environment. THe DSPUSRPRF provided me all users for all environments (production, test, training). How can I only get users in the production environment?

    Mbalg5 pointsBadges:
  • Antivirus questions for Windows network

    Is antivirus on the windows 2003 server and not on the desktops of Non-connected devices? They can not get to the Internet. The user saves all files to the server. Is it ok to only have antivirus on the server?

    Karl Gechlik9,860 pointsBadges:
  • Access is denied to Remote Agent (veritas backup verion 10.00)

    I got a job fail report, it says "[tt class="ERROR">Access is denied to Remote Agent. Check the login account for the specified device[/tt][tt class="ERROR">"[/tt]   it was working fine the other day, i check everything, i make sure the logon account for the veritas have admin rights and i have...

    Calvin05 pointsBadges:
  • Production SQL Database has been restored with Old database backup

    Dear Expert, I need your Advice, today in morning i run Symantec backup restore on SQL 2008 server where i overwrite the production Database with Old backup. Is there any way i can retreive the old Database until yesterday. i dnt have any backup of New database which i accidentally overwritten.  ...

    Aleem60015 pointsBadges:
  • password

    I can't remember my admin password on an old workstation, is there any backdoor I can use to obtain the password or change it? Can I install another harddrive with an operating system on it and go into the old boot drive and find the password somehow?

    Thebigt15515 pointsBadges:
  • Block FTP access of all kinds using a Sonicwall Firewall

    How can we block FTP access to and from our network using a Sonicwall Pro 200 device? We want to block ftp, tftp and sftp. How can we do this?

    Karl Gechlik9,860 pointsBadges:
  • Uplinking one 4000m Hp Procurve to another

    What is the proper way to connect two HP 4000M pro curve switches together? Is there a specific uplink port? Can we connect the switch to the other using two ports for redundancy? (We tried this and it takes the network down!)

    Karl Gechlik9,860 pointsBadges:
  • How to configure two default gateways to be 2 ISP (PIX 525)

    I have a network as follows: PIX Firewall 525 uses three network interface Ethernet1, Ethernet2, Ethernet3. E1 (10.0.0.1, Inside) connected to LAN E2 (117.16.126.35, Outside) connected to the modem (117.16.126.33) ISP1 (This address by the ISP level) E3 (192.168.1.2, Outside2) connected to the...

    Arowana200015 pointsBadges:
  • Open IT Forum: Segregation of duties versus full access for sys admins?

    We had a question in the forums recently that brought up an interesting dilemma: In sensitive roles such as systems administrators, do you believe in granting full access or employing a segregation of duties to minimize risk? We'd love to hear how your company deals with these executive decisions...

    MelanieYarbrough6,345 pointsBadges:
  • Open IT Forum: Security concerns of forwarding work emails and other corporate personalizations.

    A recent question from the community regarding forwarding work emails to a third party account such as Gmail spurred a reaction of general distaste. What are your thoughts on the IT risks posed by melding the personal with professional, whether it be through social networking sites, smart phones,...

    MelanieYarbrough6,345 pointsBadges:
  • Protecting a file folder from everyone except two users

    Is there a way to protect a file folder on a Windows server 2003 from everyone including domain administrators? I want this confidential file to only be accessible to the President and I. How can I do this?

    Troubleshooter24755 pointsBadges:
  • who is using encryption on my email account

    l think my email is being hacked but not sure l have been recieving encryped emails and want to know is this coming from home or being hacked

    Ally1235 pointsBadges:
  • Can a remote access install LoJack to recover a stolen laptop?

    My laptop got stolen yesterday. It has Windows Vista Ultimate 64-bit. Can a remote access find or install LoJack on it?

    NetworkingATE1,545 pointsBadges:
  • Need VBScript to locate and export ACL of a Exchange Public folder

    Hi, I'm looking for a VBScript that will search and display complete path of an exchange Public Folder (either using Outlook or other tools) and then export ACL (all members with their permissions". For first part, since Outlook search is very slow, it would be nice if the script can do a better...

    Fullyfandoo5 pointsBadges:
  • No access to mail from outside the network

    Lost all access to my mail from outside the network.  What could be wrong

    Larae5 pointsBadges:
  • ID Theft and National Security

    If it turns out, as I believe, that enemies of the United States are behind a lot of the major ID thefts in the US, that would mean that a lot of money is going to our enemies. Can we therefore surmise that those who mishandle our identity information, by means of their poor stewardship of our...

    InfoSafety75 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following