Skip to main content

Posts

Showing posts from October, 2012
File & Print Server Admins are getting tense at the time of migration if it is P2V or New Hardware replacement because of huge data and shares after migration NTFS permissions should not change. Few things to check. 1) How many file shares we have & the resouce. Quick way to get this information is

BYOD-Bring Your Own Device.

BYOD Bring Your Own Device.   _____________________________________________________________________________________                Last couple of years I am watching industry everyone is saying just about BYOD. How to implement BYOD in their corporate environment?   Doesn’t   really that simple that I can bring in my own device in the office take example I am working on my own   Mac Book & doing all the necessary stuff from own notebook. Yes it looks awesome now I don’t have to charge 2 laptops personal vs. Corporate, I don’t have to carry both laptops, While overseas travel I don’t have To declare laptop along with me, now for some personal work I don’t have to switch from corporate laptop to personal one, I don’t have to think ten times before installing any application from net to laptop but policies & process. Yes it gave to lot of freedom if I carry my own device to office those are direct benefit to me but what are the benefit corporation is going get bec

Beyond Trust

Beyond Trust Last one year I am working on tool called Beyond Trust. Beyond Trust is basically a tool make sure none of our users should have administrative privileges on their computer in return we save number of virus calls for service desk/help desk, non-standard applications related problem. (User is no more empowered to install any application from Internet to their box). You must be having question how we handle applications which need Administrative Right to get it executed or get it going. ' Yes that’s the question we also came across to avoid such issues we started creating Beyond Trust Exception rules which means those particular applications will only run in evalution instead user get entire admin privileges. Beyond Trust- We normally publish Beyond Trust Power Broker tool in user’s computer which does all the magic for limiting users from being administrative privileges on their id locally on their workstation. Polmon Logs: Polmon.exe (Policy Monitor) Tool he