The blog where we post real life IT situations, problems and resolutions...

Tuesday, July 24, 2007

FW: E-mail:- large files

From: Sayed, Zubair
Sent: 24 July 2007 10:53 AM
To: '******'
Subject: RE: E-mail:- large files


The fact that you created an empty mailbox does not mean a user can send large files/attachments. This is not controlled from the client.

Follow these steps to check if there are any limits imposed on the user account first, if your environment is configured to use Mailbox store defaults than you need to check with the Exchange admins what the organizational limit is set at.

To check if limits are placed in the user account follow these steps: This depends if the problem is experienced with just one user or all.

Either on the Exchange server or DC or any other server or workstation with the Exchange Server tools installed:

1. Find the user account or any user account in AD

2. Double click or open properties of user account

3. If the Exchange tools are installed you should see a tab called - Exchange General

4. Then click on Storage limits

5. If the use Mailbox Store Defaults are select this means the limit is set from the Exchange Server, now you can manually change this but I don’t think you want to do this. (see image)

6.

To check the limits on the Exchange server you need to:

1. Open Exchange System Manager

2. Find your mailbox stores or any store, right click on the store, select properties and click on the Limits tab.

3. WARNING: Be sure not to click the Dismount Store option, then you in deep trouble. L

If there are limits set I recommend you get permission before changing or granting a user larger file sending/receiving limits, as this can pose serious security risks for the entire organization.

Hope this helps….

Regards

Zubair

From: [mailto:******@*********.***]
Sent: 24 July 2007 10:37 AM
To: Sayed, Zubair
Subject: E-mail:- large files

Thanks I sorted it out by deleteing the nk2 files.


I have another issue with sending large e-mails E.g. 15 megbytes


I have created a new account with nothing in the mailbox and cannot send this file.


Please assist me here.


Thanks


Monday, July 23, 2007

Exchange/Global Address List Issue & IE 6 Issue

There are 2 ways that you can achieve this, the easy way and the tedious way, I suggest you try the easy way first and then take it from there.

Global Address List Fix:

As far as I understood you yesterday you had a user account created in AD with an Exchange Mailbox linked to it, example: someone@whatever.com and the account was deleted, and now it has been recreated for whatever reason and when a user sends an email to this email address he receives an undeliverable message?

What I need to know is does this happen to all users or just one user????

If this occurs only when one user is sending mail to this address on the GAL (Global Address List) I suggest you first Download the Full address book in Outlook, this is a major problem with Exchange environments when a user is using Cached Exchange Mode and changes are made to the GAL…. Try these 2 steps first before doing anything on the Exchange server!!!

To do this is in Outlook 2003/2007: (other versions might have slightly different ways to do this)

Step 1. Click on Tools >>> Send & Receive >>> Download Address Book >>> Download Full Details – this will ensure the user gets the latest address book.

Step 2. For this step ensure Outlook is closed, search on the client pc for a file called outlook.nk2 or any file with a .nk2 extension, delete all files with .nk2 extension and re-open Outlook and try sending an email to this user again…. This should resolve your issue

If this issue affects all users in the environment you can try these Exchange fixes….

1. Run the Recipient Update Service (RUS)

2. If you have deleted the user from AD and they still show in the global address list, you must run "mailbox cleanup" on your Exchange server. After that you can "Purge" the mailbox, this will delete the users emails and remove the user from the global address list.

IE Fix: The fix I have is for IE6, not sure about IE7, I need to know when the error occurs etc, like when a certain website is accessed maybe when accessing a particular Active X Control or Flash enabled site…..

Try this:

Repair Internet Explorer 6

A number of XP users have reported situations with Internet Explorer 6 becoming corrupted and reporting a number of different errors. While there is certainly no guarantee, the two procedures listed below have restored functionality to IE6 for many users experiencing problems.

Note: Both methods listed require that the Microsoft Windows XP CD-ROM be available.

Method 1: Microsoft Internet Explorer 6.x Repair for Windows XP

· From the Start menu, select Run.

· In the Open field, type sfc /scannow (Note: There is a space between sfc and /scannow)

· Select the OK button.

· Follow the prompts throughout the System File Checker process.

· Reboot the computer when System File Checker completes.

Method 2: Microsoft Internet Explorer 6.x Repair for Windows XP

· From the Start menu, select Search, select All Files and Folders.

· Select More Advanced Options and place a checkmark beside Search Hidden Files and Folders option.

· Ensure that Search System Folders and Search Subfolders are also checked.

· In the All or Part of the File Name box, type ie.inf

· In the Look In drop-down menu, select C: or the letter of the hard drive that contains the Windows folder.

· Click the Search button.

· In the search results pane, find the ie.inf file located in Windows\Inf folder.

· Right click the ie.inf file and click Install on the context menu.

· Reboot the computer when the file copy process is complete.

Good Luck!

PS: if the Outlook/Exchange fix does not work than there are other ways to resolve this, but it will mean we will have to drill deeper in Exchange….

Kind regards

Zubair Sayed

Siemens IT Solutions and Services (Pty) Ltd

Systems Engineer

Shared Services

Siemens Southern Africa

www.siemens.co.za / www.siemens.com

Please send me the fix for ie 6 and the settings to purge global address book.

Thanks


Labels: , , , , ,

Thursday, July 19, 2007

Malware: Malware Threats & Malware Removal Kit

The Malware Removal Kit is a download from TechNet that provides you with excellent guidance and tools to help you restore PCs infected with malware.

 

The newest Solution Accelerator from Microsoft, it provides free, tested guidance to help you combat malware attacks and restore infected systems - so users can safely get back to work.

 

The kit shows you how to use the Windows Pre-installation Environment (Windows PE) to discover malware by performing a thorough offline scan of your computers, uncovering malware that may be hiding in the operating system. And once malware is located and identified, it can be quickly removed from infected PCs with a number of free anti-malware tools, like the Malicious Software Removal Tool from Microsoft.

 

Download here: http://www.microsoft.com/downloads/details.aspx?FamilyID=6cd853ce-f349-4a18-a14f-c99b64adfbea&displaylang=en

 

Malware Threats

 

The first step toward containing the spread of malware is to understand the various technologies and techniques that malware authors can use to attack your computer. Malware threats directly target both users and computers. However, it is also important to know that the majority of threats come from malware that targets the user rather than the computer. If a user with administrator-level user rights can be tricked into launching an attack, the malicious code has more power to perform its tasks. Such an attack can frequently cause more damage than one that has to rely on a security hole or vulnerability in an application or the operating system.

 

How Does Malware Get In?

Malware uses many different methods to try and replicate among computers. The following table lists common malware threats to organizations and provides examples of tools that you can use to mitigate them.

 

Table 1: Malware Threats and Mitigations

Threat

Description

Mitigation

E-mail

E-mail is the transport mechanism of choice for many malware attacks.

Spam filters

Real-time antivirus and antispyware scanners

User education

Phishing

Phishing attacks try to trick people into revealing personal details such as credit card numbers or other financial or personal information. Although these attacks are rarely used to deliver malware, they are a major security concern because of the information that may be disclosed.

Spam filters

Pop-up blockers

Antiphishing filters

User education

Removable media

This threat includes floppy disks, CD-ROM or DVD-ROM discs, Zip drives, USB drives, and memory (media) cards, such as those used in digital cameras and mobile devices.

Real-time antivirus and antispyware scanners

User education

Internet downloads

Malware can be downloaded directly from Internet Web sites such as social networking sites.

Browser security

Real-time antivirus and antispyware scanners

User education

Instant messaging

Most instant messaging programs let users share files with members of their contact list, which provides a means for malware to spread. In addition, a number of malware attacks have targeted these programs directly.

Real-time antivirus and antispyware scanners

Personal firewall

Restrict unauthorized programs

User education

Peer-to-peer (P2P) networks

To start file sharing, the user first installs a client component of the P2P program through an approved network port, such as port 80. Numerous P2P programs are readily available on the Internet.

Real-time antivirus and antispyware scanners

Restrict unauthorized programs

User education

File shares

A computer that is configured to allow files to be shared through a network share provides another transport mechanism for malicious code.

Real-time antivirus and antispyware scanners

Personal firewall

User education

Rogue Web sites

Malicious Web site developers can use the features of a Web site to attempt to distribute malware or inappropriate material.

Browser security

Pop-up blockers

Antiphishing filters

User education

Remote exploit

Malware might attempt to exploit a particular vulnerability in a service or application to replicate itself. Internet worms often use this technique.

Security updates

Personal firewall

Network scanning

Malware writers use this mechanism to scan networks for vulnerable computers that have open ports or to randomly attack IP addresses.

Software updates

Personal firewall

Dictionary attack

Malware writers use this method of guessing a user's password by trying every word in the dictionary until they are successful.

Strong password policy

User education

 

From a security perspective, it would seem best to block all these malware transport methods, but this would significantly limit the usefulness of the computers in your organization. It is more likely that you will need to allow some or all of these methods, but also to restrict them. There is no single anti-malware solution that will fit all organizations, so evaluate the computer requirements and risks for your organization, and then decide how best to defend against malware that attempts to exploit them.

Windows Server 2008 Beta Is Now Available for Download

The next generation of the Windows Server operating system gives you more control, greater flexibility, and increased protection for your server infrastructure while reducing time and costs. And when you download or order the beta software, you're automatically registered to access valuable beta resources assembled in one convenient Beta Central location.

 

Download link: Windows Server 2008 Beta Is Now Available for Download

Wednesday, July 11, 2007

Windows SteadyState for Windows XP

Windows SteadyState is a download for Windows XP that can help protect your family from inappropriate Web content and contact on the Web. Windows SteadyState also protects your computer settings from unwelcome changes by your children.

You can download SteadyState at no charge to people using genuine Microsoft Windows XP.

http://www.microsoft.com/protect/products/family/steadystate.mspx

Tuesday, April 10, 2007

Developments in Microsoft Certification and Your Windows Server Credential or Exam Path

As you may know, Microsoft® has introduced a new certification framework to better reflect both technology-specific expertise and professional skills. All new offerings are synchronized with Microsoft technology releases. A new set of certifications will release in late calendar year 2007 in support of the Microsoft Windows Server® Code Name "Longhorn".To help you make an informed decision about your Windows Server certification path, we want to make you aware that:

• MCSA and MCSE on Windows Server 2003 credential holders will have a cost- and time-efficient upgrade path to Windows Server "Longhorn" certifications. There will not be an upgrade path from Windows Server NT or Windows Server 2000 certifications.

• MCSA and MCSE on Windows Server 2000 can still migrate to Windows Server 2003 using the one- or two-exam upgrade path, respectively. The 70-292 and 70-296 upgrade exams will retire in early calendar year 2008.

• Additional electives have been added to the MCSE on Windows Server 2003 track to make it easier to complete your requirements.

• The Windows Server "Longhorn" certifications will be released in the new generation format of Microsoft Certified Technology Specialist (MCTS) and Microsoft Certified IT Professional (MCITP) credentials. There will not be a Microsoft Certified Systems Administrator (MCSA) or Microsoft Certified Systems Engineer (MCSE) credential associated with Windows Server "Longhorn."

• MCSA and MCSE are, and will remain, the premier vehicles for demonstrating skills on Windows Server 2000 and 2003.

Find the Information and Training You Need to Inform Your Next Step
We have created a web page with links to more information, a Live Meeting with certification planners, and other resources to support your next step in Windows Server certifications and to understand your opportunity for Windows Server "Longhorn."

Visit Microsoft.com

Wednesday, March 14, 2007

How to keep others from hijacking your home wireless network

Another very common question I get asked is around wireless security and will my neighbours or other businesses in the area be able to "hijack" my network and use my bandwith, steal my information etc... in a way this is possible, however there are ways & means of securing your network. Most modern day routers have the security features built-in, like WEP, WPA-PSK and a host more that you can use, another example is MAC Address filtering & hiding your SSID (Security Set Identifier).

I have managed to find some tips for you and added them to my blog to ensure that you can secure your wireless network or even better understand the terms used with wireless networking... However I do wireless network installations, including security setups so contact me if you require a setup. (Leave a comment with your details and I will get back to you)

Leaving your wireless network unprotected could be an open door for nosy neighbors—or worse—mobile malicious attackers searching for wireless networks to break into, a practice known as wardriving.
It's not uncommon for a home user with a wireless-enabled computer to pick up a wireless network signal, often inadvertently, from a next-door neighbor's access point.

What is "wardriving"?

This term means to cruise down streets with a wireless computer or other radio-enabled device attempting to locate, identify, and infiltrate wireless networks.
A wardriver who accesses your network could anonymously hijack your Internet connection, steal personal information stored on your network, intercept file transfers, or even use your computer as a "
zombie" to send out spam or malicious software that could be traced back to you.
Fortunately, by following a few best practices you can significantly decrease your vulnerability to these attacks.




Tips to help protect your wireless network

If you aren't sure how to do some of these, ask someone with computer experience, like ME that you trust to help or visit Microsoft Support, or drop by our friendly Security Community.

Encrypt all information transmitted through your access point.

•Specify the computers your access point will only recognize using Media Access Control (MAC) addresses & filtering as I mentioned earlier.

Add a firewall to your network access point and to each computer on the network and keep all of them current (note that the latest version of Windows XP SP2 features a built-in firewall).

•Avoid storing passwords, social security numbers, credit card numbers, details about family members, or other personal information on your computer.

•Place the wireless access point away from windows and near the center of your house to decrease the signal strength outside of the intended coverage area.

•Keep Windows and related security tools current using Automatic Updates.

•Install antivirus software and Windows Defender and keep them up-to-date. Consider using a comprehensive security service like Windows Live OneCare.

•Revisit established and trusted computer security organizations and sites to stay current with the latest security technologies, methods, alerts, and related information.

•If you are unable to use encryption, connect to your wireless access point with a network cable when sending financial or other critical information over the Internet.

Although no method is 100% secure, you can help deter or prevent unauthorized access by applying these basic steps to deter others looking to steal personal information, Internet access, or even send out spam e-mail in your name.

Labels: , , , , , ,

5 security features in Windows Vista that you might not know about

Here are five security features in Windows Vista that might just surprise you:

1. Check your spyware protection through the Windows Security Center. If you've used Windows XP, then you already know about Windows Security Center, the all-in-one monitoring tool that helps you keep track of your firewall, automatic updates, and antivirus software.
Windows Security Center for Windows Vista has more security categories. It now warns you if your antispyware software is not up and running like it should be.

For more information on the new features of the Windows Security Center, see the Windows Vista Security blog.

2. Help prevent identity theft with Phishing Filter. Windows Vista comes with Phishing Filter, which is built in to Internet Explorer 7. You just need to turn it on.
The filter checks Web pages before you connect to them and warns you about sites that have typical characteristics of fraudulent Web sites designed to steal your identity, sometimes called phishing scams.

The filter is updated several times an hour using the latest security information from Microsoft and several industry partners. This can help you avoid identity theft from phony sites that might look, for example, like your bank's site.
For more information, see Phishing Filter: Help protect yourself from online scams.

3. New junk mail filters for Windows Mail. Windows Mail, the new e-mail program that comes with Windows Vista, helps reduce the risks of junk mail and scams.
In fact, Windows Mail comes with a junk e-mail filter that until now has been available only in Microsoft Office Outlook.
For more information, see Windows Vista: Windows Mail.

4. Track what your children are doing online. If you’re a parent, you already know how important it is to have open communication with your children about their computer use.

You might also want to review what your child is doing online. With Windows Vista, you can create activity reports that provide details of how your children have spent their time on the computer, including the Web pages they've visited, programs they've used, and games they've played.

For more information, see Windows Vista Parental Controls.

5. Find security tools faster. When you want to change settings on the security tools in Windows Vista, there’s no need to dig through the Start menu or the control panel. Simply type "Windows Security Center," "Phishing Filter," "Parental Controls," or any other program or file into the Instant Search box on the Start menu and then select it from the programs list.

Labels: , , , ,

Microsoft Malicious Software Removal Tool

The Microsoft Windows Malicious Software Removal Tool checks computers running Windows XP, Windows 2000, and Windows Server 2003 for infections by specific, prevalent malicious software—including Blaster, Sasser, and Mydoom—and helps remove any infection found. When the detection and removal process is complete, the tool displays a report describing the outcome, including which, if any, malicious software was detected and removed.
Microsoft releases an updated version of this tool on the second Tuesday of each month, and as needed to respond to security incidents. The tool is available from Microsoft Update, Windows Update and the Microsoft Download Center.

Tool can be downloaded by clicking here...

Labels: , , , , , , , ,

Tuesday, March 13, 2007

McAfee SiteAdvisor

I found a very useful Web site called McAfee SiteAdvisor that helps protect you from spyware, adware, spam, and identity theft. I thought you might also want to try SiteAdvisor so you can stay safer online.

Whenever you visit a Web site or are asked to provide your e-mail address online, SiteAdvisor displays a red or green rating based on the results of its tests of that site. SiteAdvisor will also warn you about "phishing" sites and other kinds of online scams. To try it, just go to http://www.siteadvisor.com/

ps: please note Red means NO GO, and Green means OK.

New Exams - Vista

70-624 - TS: Deploying and Maintaining Windows Vista Operating System and 2007 Microsoft Office System Desktop

You can register with any test taker, VUE or Prometric which ever you prefer.

Also note the upgrade, Vista exam from MCDST to MCITP has been delayed and will only be released around May. I await that one.....