I had a problem where i needed to remove the AV off our servers on a large scale and found that the manual process for this was quite time consuming.
Because CA sold the antivirus business to TotalDefence, a lot of the documentation disappeared from their website so it took some playing around with how to do it successfully.
The batch file does the following steps:
- Stops all eTrust services.
- Kills the processes just in case they are lingering
- runs MSIEXEC uninstall of the software, in the order that they should be. ITM Agent first, then iTechnology iGateway.
- Prompts to tell you to reboot machine
The script is relatively simple, and quite rudimentary – Read more »
I thought about why managing printing in an enterprise is so frustrating and came to a conclusion that the solutions available (and available to my budget) do not fill end users requirements but IT administrators requirements. Ultimately users what to print something, to the closest printer without having to install printers/drivers or speak to IT, where as IT administrators want to control deployment, configure default settings and centrally control access.
Read more »
Computer naming conventions are like creating an Active Directory hierarchy – there is no wrong or right. Its more about what best suits your current and future needs. Over the years my naming conventions have evolved and below I will document my currently preferred method. First we will look at the technical constraints when naming them, and what characters I recommend using.
Read more »
Having worked in help-desk roles in the past I know the importance of knowing which user has logged onto which computer. Its simple stuff really, but unless you have 3rd party systems like System Center 2012 (SC12) or client agents, its either hard or time consuming to find out the relation between users and computers. What we needed was an easy way to find out what the last logged on user was for every machine. Read more »
You have just downloaded the Adobe Flash Player distributable, created an mms.cfg configure file and you want to push it out to your network. You might be scratching your head on how to do this if you don’t have an enterprise software deployment solution?
Don’t worry – there is no need for that – all you need is Group Policy Preferences to push out your mms.cfg config file to your clients! Read more »
In our network we have had a problem where a lot of our users never configured their Microsoft Office user details and simply accepted the defaults. In our case it was ‘Admin’ due to our SOE not accommodating for it.
Example of the data I am referring to:
Read more »
This article has been superseded by a new article that includes Adobe Flash 11 (including 32Bit and 64Bit deployments)
So we need to update Adobe Flash for our users…again. With all the security vulnerabilities this one I like to keep on top of as much as I can even though it slips from time to time. Below is a quick summary of how I deploy Adobe Flash using Group Policy.
In brief i will document:
- Where to download the distribution version
- How to deploy it via GPO
- How to prevent the automatic updating
Read more »
Well I have had the pleasure of setting up a KMS server in our environment, and found that the documentation from Microsoft is somewhat confusing. In light of this I will write the steps I used to configure the first KMS server in our organisation for use with Windows Server, Windows client and Microsoft Office activation. These steps will only include the installation of 1 KMS server. Read more »
GPRESULT, or otherwise known as Resultant Set of Policy Queries is a tool used to provide client end information of Group Policy settings.
The utility ships with all current versions of Windows and is used to aid administrators in troubleshooting group policy problems. The policy is very similar between all versions of Windows, however Windows Vista and Windows 7 requires elevation. Read more »
So I wanted an answer to a very simple question. Who on my network has been given Local Admin rights?
We have had requirements in the past where users had to be administrators for whatever reason, usually due to applications not working. Now i want to get a better understanding of who has access so we can try and minimise this (as I find it to be a security risk).
I did some searching around and it looks like i have found the a very simple solution. In short its a simple 2 line script that checks domain users (other than Domain Admins) and saves them in a file called %computername%.txt. It then searches that file for the user names and creates a new file for each user name in a different file called %username%.txt. Read more »