The reality is that your network is under attack. The bad guys are using advanced machine learning techniques to exploit sometimes subtle vulnerabilities in your network implementation and design to gain a foothold inside your network. These footholds then use map the network, determine who the domain admin IDs are, who the local admins […]
The reality is that your network is under attack. The bad guys are using advanced machine learning techniques to exploit sometimes subtle vulnerabilities in your network implementation and design to gain a foothold inside your network. These footholds then use map the network, determine who the domain admin IDs are, who the local admins […]
The summer months are often very busy times as we try to get all our projects accomplished before school starts again. This month Scott Quimby will discuss summer priorities. There are so many important tasks that never seem to get done during the school year.
This month Scott Quimby continues his discussion of Microsoft Group Policy. He will focus on Microsoft Windows logon performance and reliability. There are a myriad of different settings that affect how long it takes the user to get to a functional desktop from the initial Windows logon screen.
Scott Quimby continues his discussion of Microsoft Group Policy. He will focus on the different ways to deliver items to an end user’s desktop. These include: Shared folders via a folder re-direction group policy. Delivering customized shortcuts via Group Policy Preference Extensions including Item Level Targeting strategies.
Senior Systems Engineer and Microsoft MCSE Prayer Solanky presented an introduction to PowerShell. Microsoft is increasingly moving towards command based management for server administration. Prayer will present an introduction to the PowerShell interface and introduce some basic PowerShell server administration commands.
Scott Quimby provides continues his discussion of Microsoft Group Policy. He will focus on a couple of important aspects of Group Policy: Group Policy Modeling – How to know what is supposed to happen to a specific user on a specific computer and also know what policy is controlling the behavior.
This month Scott Quimby will discuss Windows and Microsoft Office Activation. Microsoft activation can be a confusing topic and it isn’t uncommon for our clients to have activation issues as they transition to newer OSes and newer versions of Microsoft Office.
This month Scott Quimby provides an overview of Microsoft Group Policy. Group Policy is Microsoft’s preferred way to control the personality and many of the basic security options of domain joined Microsoft Windows computers or servers on a network. It is split into two distinct types of policies.
Click on January 2014 Tech Talk Quick Hits to listen to CSI’s “Quick Hits” presentation. This was originally given in January of 2014 at our quarterly Tech Talk presentations in our office. This presentation is a compendium of short, timely technical tidbits on various software and hardware issues affecting K-12 technology in schools.