The blog where we post real life IT situations, problems and resolutions...

Tuesday, July 24, 2007

FW: E-mail:- large files

From: Sayed, Zubair
Sent: 24 July 2007 10:53 AM
To: '******'
Subject: RE: E-mail:- large files


The fact that you created an empty mailbox does not mean a user can send large files/attachments. This is not controlled from the client.

Follow these steps to check if there are any limits imposed on the user account first, if your environment is configured to use Mailbox store defaults than you need to check with the Exchange admins what the organizational limit is set at.

To check if limits are placed in the user account follow these steps: This depends if the problem is experienced with just one user or all.

Either on the Exchange server or DC or any other server or workstation with the Exchange Server tools installed:

1. Find the user account or any user account in AD

2. Double click or open properties of user account

3. If the Exchange tools are installed you should see a tab called - Exchange General

4. Then click on Storage limits

5. If the use Mailbox Store Defaults are select this means the limit is set from the Exchange Server, now you can manually change this but I don’t think you want to do this. (see image)

6.

To check the limits on the Exchange server you need to:

1. Open Exchange System Manager

2. Find your mailbox stores or any store, right click on the store, select properties and click on the Limits tab.

3. WARNING: Be sure not to click the Dismount Store option, then you in deep trouble. L

If there are limits set I recommend you get permission before changing or granting a user larger file sending/receiving limits, as this can pose serious security risks for the entire organization.

Hope this helps….

Regards

Zubair

From: [mailto:******@*********.***]
Sent: 24 July 2007 10:37 AM
To: Sayed, Zubair
Subject: E-mail:- large files

Thanks I sorted it out by deleteing the nk2 files.


I have another issue with sending large e-mails E.g. 15 megbytes


I have created a new account with nothing in the mailbox and cannot send this file.


Please assist me here.


Thanks


Monday, July 23, 2007

Exchange/Global Address List Issue & IE 6 Issue

There are 2 ways that you can achieve this, the easy way and the tedious way, I suggest you try the easy way first and then take it from there.

Global Address List Fix:

As far as I understood you yesterday you had a user account created in AD with an Exchange Mailbox linked to it, example: someone@whatever.com and the account was deleted, and now it has been recreated for whatever reason and when a user sends an email to this email address he receives an undeliverable message?

What I need to know is does this happen to all users or just one user????

If this occurs only when one user is sending mail to this address on the GAL (Global Address List) I suggest you first Download the Full address book in Outlook, this is a major problem with Exchange environments when a user is using Cached Exchange Mode and changes are made to the GAL…. Try these 2 steps first before doing anything on the Exchange server!!!

To do this is in Outlook 2003/2007: (other versions might have slightly different ways to do this)

Step 1. Click on Tools >>> Send & Receive >>> Download Address Book >>> Download Full Details – this will ensure the user gets the latest address book.

Step 2. For this step ensure Outlook is closed, search on the client pc for a file called outlook.nk2 or any file with a .nk2 extension, delete all files with .nk2 extension and re-open Outlook and try sending an email to this user again…. This should resolve your issue

If this issue affects all users in the environment you can try these Exchange fixes….

1. Run the Recipient Update Service (RUS)

2. If you have deleted the user from AD and they still show in the global address list, you must run "mailbox cleanup" on your Exchange server. After that you can "Purge" the mailbox, this will delete the users emails and remove the user from the global address list.

IE Fix: The fix I have is for IE6, not sure about IE7, I need to know when the error occurs etc, like when a certain website is accessed maybe when accessing a particular Active X Control or Flash enabled site…..

Try this:

Repair Internet Explorer 6

A number of XP users have reported situations with Internet Explorer 6 becoming corrupted and reporting a number of different errors. While there is certainly no guarantee, the two procedures listed below have restored functionality to IE6 for many users experiencing problems.

Note: Both methods listed require that the Microsoft Windows XP CD-ROM be available.

Method 1: Microsoft Internet Explorer 6.x Repair for Windows XP

· From the Start menu, select Run.

· In the Open field, type sfc /scannow (Note: There is a space between sfc and /scannow)

· Select the OK button.

· Follow the prompts throughout the System File Checker process.

· Reboot the computer when System File Checker completes.

Method 2: Microsoft Internet Explorer 6.x Repair for Windows XP

· From the Start menu, select Search, select All Files and Folders.

· Select More Advanced Options and place a checkmark beside Search Hidden Files and Folders option.

· Ensure that Search System Folders and Search Subfolders are also checked.

· In the All or Part of the File Name box, type ie.inf

· In the Look In drop-down menu, select C: or the letter of the hard drive that contains the Windows folder.

· Click the Search button.

· In the search results pane, find the ie.inf file located in Windows\Inf folder.

· Right click the ie.inf file and click Install on the context menu.

· Reboot the computer when the file copy process is complete.

Good Luck!

PS: if the Outlook/Exchange fix does not work than there are other ways to resolve this, but it will mean we will have to drill deeper in Exchange….

Kind regards

Zubair Sayed

Siemens IT Solutions and Services (Pty) Ltd

Systems Engineer

Shared Services

Siemens Southern Africa

www.siemens.co.za / www.siemens.com

Please send me the fix for ie 6 and the settings to purge global address book.

Thanks


Labels: , , , , ,

Thursday, July 19, 2007

Malware: Malware Threats & Malware Removal Kit

The Malware Removal Kit is a download from TechNet that provides you with excellent guidance and tools to help you restore PCs infected with malware.

 

The newest Solution Accelerator from Microsoft, it provides free, tested guidance to help you combat malware attacks and restore infected systems - so users can safely get back to work.

 

The kit shows you how to use the Windows Pre-installation Environment (Windows PE) to discover malware by performing a thorough offline scan of your computers, uncovering malware that may be hiding in the operating system. And once malware is located and identified, it can be quickly removed from infected PCs with a number of free anti-malware tools, like the Malicious Software Removal Tool from Microsoft.

 

Download here: http://www.microsoft.com/downloads/details.aspx?FamilyID=6cd853ce-f349-4a18-a14f-c99b64adfbea&displaylang=en

 

Malware Threats

 

The first step toward containing the spread of malware is to understand the various technologies and techniques that malware authors can use to attack your computer. Malware threats directly target both users and computers. However, it is also important to know that the majority of threats come from malware that targets the user rather than the computer. If a user with administrator-level user rights can be tricked into launching an attack, the malicious code has more power to perform its tasks. Such an attack can frequently cause more damage than one that has to rely on a security hole or vulnerability in an application or the operating system.

 

How Does Malware Get In?

Malware uses many different methods to try and replicate among computers. The following table lists common malware threats to organizations and provides examples of tools that you can use to mitigate them.

 

Table 1: Malware Threats and Mitigations

Threat

Description

Mitigation

E-mail

E-mail is the transport mechanism of choice for many malware attacks.

Spam filters

Real-time antivirus and antispyware scanners

User education

Phishing

Phishing attacks try to trick people into revealing personal details such as credit card numbers or other financial or personal information. Although these attacks are rarely used to deliver malware, they are a major security concern because of the information that may be disclosed.

Spam filters

Pop-up blockers

Antiphishing filters

User education

Removable media

This threat includes floppy disks, CD-ROM or DVD-ROM discs, Zip drives, USB drives, and memory (media) cards, such as those used in digital cameras and mobile devices.

Real-time antivirus and antispyware scanners

User education

Internet downloads

Malware can be downloaded directly from Internet Web sites such as social networking sites.

Browser security

Real-time antivirus and antispyware scanners

User education

Instant messaging

Most instant messaging programs let users share files with members of their contact list, which provides a means for malware to spread. In addition, a number of malware attacks have targeted these programs directly.

Real-time antivirus and antispyware scanners

Personal firewall

Restrict unauthorized programs

User education

Peer-to-peer (P2P) networks

To start file sharing, the user first installs a client component of the P2P program through an approved network port, such as port 80. Numerous P2P programs are readily available on the Internet.

Real-time antivirus and antispyware scanners

Restrict unauthorized programs

User education

File shares

A computer that is configured to allow files to be shared through a network share provides another transport mechanism for malicious code.

Real-time antivirus and antispyware scanners

Personal firewall

User education

Rogue Web sites

Malicious Web site developers can use the features of a Web site to attempt to distribute malware or inappropriate material.

Browser security

Pop-up blockers

Antiphishing filters

User education

Remote exploit

Malware might attempt to exploit a particular vulnerability in a service or application to replicate itself. Internet worms often use this technique.

Security updates

Personal firewall

Network scanning

Malware writers use this mechanism to scan networks for vulnerable computers that have open ports or to randomly attack IP addresses.

Software updates

Personal firewall

Dictionary attack

Malware writers use this method of guessing a user's password by trying every word in the dictionary until they are successful.

Strong password policy

User education

 

From a security perspective, it would seem best to block all these malware transport methods, but this would significantly limit the usefulness of the computers in your organization. It is more likely that you will need to allow some or all of these methods, but also to restrict them. There is no single anti-malware solution that will fit all organizations, so evaluate the computer requirements and risks for your organization, and then decide how best to defend against malware that attempts to exploit them.

Windows Server 2008 Beta Is Now Available for Download

The next generation of the Windows Server operating system gives you more control, greater flexibility, and increased protection for your server infrastructure while reducing time and costs. And when you download or order the beta software, you're automatically registered to access valuable beta resources assembled in one convenient Beta Central location.

 

Download link: Windows Server 2008 Beta Is Now Available for Download

Wednesday, July 11, 2007

Windows SteadyState for Windows XP

Windows SteadyState is a download for Windows XP that can help protect your family from inappropriate Web content and contact on the Web. Windows SteadyState also protects your computer settings from unwelcome changes by your children.

You can download SteadyState at no charge to people using genuine Microsoft Windows XP.

http://www.microsoft.com/protect/products/family/steadystate.mspx