Friday, March 4, 2011

Retaining Individual E-mail Messages


Best Practice Definition

Retaining unnecessary messages quickly takes up the storage space on the Exchange server. This can lead to a crash of the server, leading to down time for users. Thus, it is important to apply correct storage practices to these messages. (Exchange is not meant for long term storage of information!)

Best Practice Usage

When you receive a message that you need to save beyond 365 days, you should save the message in your "My Documents" directory on your hard drive (which is backed up to your O: drive daily).  After saving the attachment, delete it from the message or delete the entire message itself.

Steps to save a message:

·         Highlight or Open the attachment and choose "File", "Save As".
·         Select the appropriate directory in My Documents (preferred storage location).
·         Select the File Type RTF format for text only                                                                                                      MSG format to save as message format with attachment 
·         Click OK.
·         Delete the original Message.

Steps to save multiple messages
                       
·         Open explorer session and create folder for messages to be saved in
·         Open outlook
·         Go to the outlook folder (eg Inbox)and select multiple messages to move. You can select non-adjacent messages by holding down the CTRL-key                                        
·         Ensure all messages to move are highlighted.
·         Click and drag to start tool bar – ensure cursor is over explorer session
·         Explorer session will maximise
·         Drop messages into required directory.
·         Check that messages have copied across OK
·         Delete messages from outlook


NOTE:

If your message has the same subject line as an existing one in the destination folder, it WILL OVERWRITE the original message.

When copying multiple messages – all  messages should be highlighted at message level not folder name. Complete folders cannot be copied across by the folder name -  this will create shortcuts to the original message.

Always check that the messages have successfully copied across (and ensure that they are not shortcuts) before deleting them from outlook.                               
           

===============================================

How will I know when I am reaching the maximum size limitations?


·         Warning messages when total size of mailbox is approaching the maximum allowed.  The message will look like this:

You are exceeding the size limit set on your mailbox by the system administrator.
Ex. 
Your mailbox size limit is 92460 Kbytes
You are currently exceeding this limit by 11453 Kbytes

You may not be able to send new mail until you reduce your mailbox size. To free up space, delete any items that you are no longer using or move them to your Personal Folders.  Items in all of your mailbox folders including the Deleted Items and Sent Items folders count against your size limit.  You must empty the Deleted Items folder after deleting items or the space will not be freed.

·         Rejection message from “system admin” when trying to send a message if the mailbox size exceeds the preset limits.
·         Rejection message from “system admin” if the message is too large.
·         When a user exceeds the Mailbox size limit, they will still be able to receive messages, but will not be able to send new messages until they remove some of the material from their mailbox.

How can I recover deleted items? (Exchange)


The deleted items folder is kept in an archive for 7 days (Depend upon your Policies) after the messages have been deleted.

They may be recovered anytime within this 7 day period by doing the following :-
:
·         Open Outlook 98
·         Select “Deleted Items” folder
·         Select “Tools” from the menu bar
·         Choose “recover deleted items” from the drop down menu
·         Select all items you wish to recover
·         Click on the button  “ Recover selected items”
·         The deleted items will then be restored to your “Deleted Items” folder

Please Note :
The recovered messages will be deleted again from the deleted items folder when you exit outlook so they should be moved immediately to another folder outside of exchange if you wish to retain them.
Please refer to Exchange Best Practices document on your local shared drive in Help Desk Information folder for more instructions.
Deleted items will not be recoverable after seven days.

Thursday, February 10, 2011

windows admin



I can not find where to run Skype as an admin: Windows 7? - Yahoo ...
Last post: Feb 8, 2011
turn UAC off and you will never need the "run as admin" stuff anymore. ...
<http://answers.yahoo.com/question/index?qid=20110208174829AAMHf5w>

How to enable or disable the admin account in Windows 7 - Security ...
4 posts - 4 authors - Last post: Feb 8, 2011
Forum discussion: Windows comes with a built-in administrator account, but
in Windows 7 that account is hidden by default.
<http://www.dslreports.com/forum/r25443100-How-to-enable-or-disable-the-admin-account-in-Windows-7~start=40>

How do you give AD users the ability to install programs without ...
3 posts - 2 authors - Last post: Feb 8, 2011
If I add the user to the Domain Admin groups, then they are able ... Local
administrator should be all that's needed to install software in ...
<http://social.technet.microsoft.com/Forums/en-US/winserverDS/thread/4d625983-9859-4e86-8760-0a08aa17c25c/>

Q&A: how do speed up client login time to a windows server 2003 ...
4 posts - 3 authors - Last post: Feb 8, 2011
TR Dojo: Four netstat tricks every Windows admin should know VIDEO (4 of
14) TR Dojo: Four netstat tricks every Windows. ...
<http://www.techrepublic.com/forum/questions/101-206110>

Missing security tab - Security-Admin - Windows-XP
4 posts - 3 authors - Last post: Feb 8, 2011
Hello, when I right-click on the printer, then click on properties their is
no security tab.
<http://www.tomshardware.com/forum/255581-45-missing-security>

Forgot our administrator password - Tech Support Guy Forums
Last post: Feb 8, 2011
Feb 8, 2011 ... I know, its a rookie move. We had our roommate reload
windows and all our software. We can't remember what he entered as the
administrator ...
<http://forums.techguy.org/windows-xp/979696-forgot-our-administrator-password.html>

Windows Forums • View topic - What Did Your Mouse Just do for the ...
10 posts - 4 authors - Last post: Feb 8, 2011
User avatar. Site Admin. Site Admin. Windows Guru. Windows Guru ... User
avatar. Site Admin. Site Admin. Windows Guru. Windows Guru ...
<http://forum.mintywhite.com/viewtopic.php?t=3585&p=23676&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+WindowsForums+(Windows+Forums+Latest+Topics)>

Tenable Network Security: Nessus 4.4.0 on Windows Server 2008 -...
10 posts - 3 authors - Last post: Feb 8, 2011
Nessus 4.4.0 on Windows Server 2008 - nessus-adduser fails w/
"Administrator" error. Trying to run nessus-adduser as a user that is part
of ...
<https://discussions.nessus.org/message/9334;jsessionid=622AB7C0B22F2B3468BF0BA77BCF3D9F>

Saturday, February 5, 2011

Net security opening


Hi,
 
An IT company located in Kanjur marg require 3 persons for Net Security.

  • Working knowledge in Nokia Firewall with Checkpoint firewall R70
  • IBM Site Protector (IDS/IPS knowledge)
  • For Vulnerability assessment and analysis. (ISS, Nessus, GFILanguard)
  • Patch management Like Big fix, LANDesk etc...
  • Antivirus (Preferably MacAfee)
  • Packet Analysis. (Sniffer, Wire shark, Ethereal)

 Please send in your updated CV with current and expected CTC mentioned on it.

 

Thanks and Regards,
Sameer K
Consultant
Shonel Services
Cell - 9820502077 / 9820880702

Friday, February 4, 2011

Tech Support Engg at HP


HI,
Greetings from HP,

HP is hiring Tech Support Engineers for 3par at Bangalore Location,
Key Attributes

• Must possess excellent Communication skills - professional, clear, and articulate in English(oral/written)
• Have the courage to challenge processes and practices in our strive for continual improvement
• Be able to follow processes as outlined in the Support Process Guidelines.
• Interact closely with Peers, next-level team members and Managers to resolve customer issues.
• Exhibit a positive attitude to customers and other employees.
• Be able to demonstrate empathy and understanding.
• Continue to upgrade technical and customer service skills.
• Participate in shift work as required
• Ability to remain calm whilst under pressure



Requirements:

• BS in CS/EE degree or equivalent related technical school or related experience.
• 2-6 years of relevant experience in the high-tech industry, preferably within the enterprise Storage /networking arena
• General / high level knowledge of Unix Systems (Solaris, HP, AIX, LinuxWindows and VMware
• General / high level of knowledge supporting complex Enterprise Storage systems and Storage Area Networks.
• Experience in SAN Switch/Fabric: Core Edge Topology, Fiber Channel Routing and Protocol Virtual SANs, LUN Exports, host bus adapters, Storage management; NAS, and Enterprise storage systems (troubleshooting, updating, and maintaining H/W).
• Must have demonstrated ability to take initiative in identifying and successfully resolving technical problems at customer sites via phone and email.
• As an individual in this position, you must have strong communication skills, both verbal and written; be able to develop and document technical and operational notes; effectively communicate with end-customers and internally when resolving customer problems or escalating cases.
• Proven troubleshooting ability to perform end-to-end (host to storage) diagnosis of complex large scale enterprise SAN configurations in a multivendor environment.
• Experience with enterprise storage systems and networking technologies
• Ability to work with customers under a variety of circumstances and understandimg and meeting customer expectations is fundamental.

If you find the JD relevant Kindly revert back with an updated resume at the earliest'

Regards,
Vasudha Patil

Forward Your CV to   Hewlett-Packard India Pvt Ltd <vasudha-s.patil@hp.com
All the best......:)  Yours Laxman Jonnalagadda.

Hiring Security Analyst Professionals in TCS MUMBAI - Work Location : Delhi


Hi Friend,

We have openings in Tata Consultancy Services (TCS) Delhi for the following skill.

Face-to-Face interviews will be held on 5/6 -Feb-11

Security Analyst professionals - 3+ yrs.

Responsibilities:
• Maintain security administration on Medco Systems: SecureId, RACF, Oracle, Sybase,
UNIX, Alpha, eSD, Autofax, DB2, JDE, TIM
- User ID password administration
- Account creation, deletions and modifications
- Security access administration
- User ID password resets
• Maintain updated security documentation
• Support all audit initiatives
• Report systems and security issues to management
• Provide resolution and support for all day to day responsibilities

IF YOU MEET THE ELIGIBILITY CRITERIA PLEASE WALK IN

Dateâ€" 5th Feb 2011 (Saturday)
Venue- Gateway Park Akruti Business Port, Gateway Park, Road NO. 13, MIDC, Andheri Mumbai 400 093
Registration Time:
10.00 am to 12.30 pm

Dateâ€" 6th Feb 2011 (Sunday)
Venue- Vikroli office Empire Plaza, Empire Industrial Estate, (Adjacent to Empire Vitrum Glass), 101 LBS Marg, Vikhroli (West), Mumbai 400 083
Registration Time:
10.00 am to 12.30 pm

If any of your friends/colleagues are looking for opportunities, please pass this msg.

Pls carry along the following with you:
-Printed copy of TCS Online form
-A copy of your latest resume.
-A copy of your last salary slip.


Salary: Best in the Industry


Please ignore this mail if you have been INTERVIEWED by TCS in last 6 months


Eligibility :

B.E. / B.Tech / M.E. / M.Tech / MSc / MCA / MCM / MS/ MBA (IT Systems)
PGDIT (2 years full time Approved by AICTE)

B.Sc. / BCA/ B.Com /Diploma holders with 3 years of relevant functional / technical experience.

50% consistent academic records including the Qualifying exam

Correspondence/Part time courses will not be considered


Candidates who have attended TCS interviews in the last 6 months need not apply.



Contact Person:
Warm Regards
Jasleen


REVISED CCNA COURSE CONTENTS

                  
 INTERCONNECTING CISCO NETWORK DEVICES

INTRODUCTION


Course Acronym: ICND (640 – 801)                Course Duration: 40 Hours

Course Content:

·         Concepts and commands required to configure Cisco switches and multiprotocol internetworks.
·         Demonstrations, exercises, and laboratory projects to identify and recommend the best Cisco solutions.
·         Basic configuration procedures to build a multirouter, multigroup internetwork that uses LAN and WAN interfaces for the most commonly used routing and routed protocols.
·         Installation, configuration, and troubleshooting information that technical support people required to install and configure Cisco products.

Who Should Attend:              

·         Network Administrators responsible for implementing and managing small & medium business networks.
·         Customers or channel sellers new to Cisco products or to internetworking industry.
·         Network support staff who will act as network device installers & first-line support.
·         Network technicians new to Cisco products and services.
·         CCNA candidate
·         CCNP candidate

Content by Module:

·         Module 1: Getting Started with Cisco Networks
·         Chapter1: Course Introduction
·         Chapter 2: Selecting Cisco Network Devices
·         Chapter 3: Assembling and Cabling Cisco Network Devices
·         Chapter 4: Operating and Configuring a Cisco IOS Devices
·         Chapter5: Managing Your Network Environment
·         Module 2: Interconnecting Cisco Switches
·         Chapter 6: Catalyst Switch operations
·         Chapter 7: Extending Switch Functionality
·         Module 3: Interconnecting Cisco Routers
·         Chapter 8: Configuring IP Addressing
·         Chapter 9: Adding Basic IP Routing Protocols
·         Chapter 10: Basic IP Traffic Management with Access Lists
·         Chapter 11: Configuring Novell IPX
·         Module 4: Extending the Network to WAN
·         Chapter 12: Establishing Serial Point-to-Point Connections
·         Chapter 13: Completing an ISDN BRI Call
·         Chapter 14: Establishing a Frame Relay PVC Connection
·         Module 5: Solving Network Problems
·         Chapter 15: Solving basic Network Problems

REVISED CCNA COURSE CONTENTS

 

NAT     :     NETWORK ADDRESS TRANSLATION


PAT      :     PORT ADDRESS TRANSLATION

EIGRP:      EXTENDED INTERIOR GATEWAY ROUTING PROTOCOL

OSPF    :      OPEN SHORTEST PATH FIRST

VLSM:       VARIABLE LENGTH SUBNET MASKS

Functional Levels Server 2008

Functional Levels Server 2008

The features available in a Windows Server 2008 domain depend on the functional level. Therefore, you can add additional features to a domain by raising the functional level. Windows Server 2008 supports three different domain functional levels. The three domain functional levels are:

* Windows 2000
* Windows Server 2003
* Windows Server 2008

Windows 2000

When you configure a new Windows Server 2003 domain, the default domain functional level is Windows 2000. This functional level supports Windows 2000, 2003 and 2008 domain controllers. Other available features include universal groups, group nesting, group conversions and security identifier history.

Windows Server 2003

The second domain functional level is Windows Server 2003. Upgrading to this domain functional level provides support for Windows Server 2003 and 2008 domain controllers. You get all the features under the Windows 2000 functional level and additional ones that include:

* Netdom.exe management tool
* Logon time stamp dates
* Ability to redirect Users and Computers container
* Ability for Authorization Manager to store its authorization policies in AD DS
* Constrained delegation
* Selective delegation

Windows Server 2008

The third domain functional level is Windows Server 2008. This domain functional level only provides support for Windows Server 2008 domain controllers. If you want to take advantage of all the features included with Windows Server 2008, you must implement this functional level. Along with the features introduced at the previous levels, you can also take advantage of the following:

* Distributed File System
* Advanced Encryption Standard support for the Kerberos protocol
* Last Interactive Logon Information
* Fine-grained password policies

Functional levels determine the features that are available and the domain controllers that are supported. In a previous article, you learned about the three domain functional levels that are supported under Windows Server 2008. There are also functional levels at the forest level.

Windows Server 2008 supports the following three forest functional levels:

* Windows 2000 Native
* Windows Server 2003 Interim
* Windows Server 2003

Windows 2000 Native

Windows 2000 native is the default forest functional level. It provides support for Windows 2000, 2003 and 2008 domain controllers. This functional level support all of the default AD DS features.

Windows Server 2003

This forest functional level supports Windows Server 2003 and 2008 domain controllers. Along with the default features, the following features are introduced at this level:

* Forest trust
* Domain rename
* Linked-value replication
* Read-only domain controller
* Improved Knowledge Consistency Checker
* Ability to create the dynamic auxiliary class named dynamicObject
* Ability to create instances on new group types to support role-based
authorization.
* Deactivation and redefinition of attributes and classes in the schema

Windows Server 2008

The third forest functional level is Windows Server 2008. As the name implies, only domain controllers running Windows Server 2008 are supported. No additional features are introduced at this level.

Tuesday, January 11, 2011

25. Name some OU design considerations.

Windows admin interview questions (includes Vista)



OU design requires balancing requirements for delegating administrative rights - independent of Group Policy needs - and the need to scope the application of Group Policy. The following OU design recommendations address delegation and scope issues:
Applying Group Policy An OU is the lowest-level Active Directory container to which you can assign Group Policy settings.
Delegating administrative authority
usually don't go more than 3 OU levels

23. Can I get user passwords from the AD database?

Windows admin interview questions (includes Vista)



The passwords in AD are not stored encrypted by default, so they cannot be decrypted. They are hashed. The only way to recover the data from a hash is with some sort of a hacking algorithm that attempts to crack the hash (such tools exist).

22. How can you forcibly remove AD from a server, and what do you do later?

Windows admin interview questions (includes Vista)

Demote the server using dcpromo /forceremoval, then remove the metadata from Active directory using ndtsutil. There is no way to get user passwords from AD that I am aware of, but you should still be able to change them.
Another way out too
Restart the DC is DSRM mode
a. Locate the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ProductOptions
b. In the right-pane, double-click ProductType.
c. Type ServerNT in the Value data box, and then click OK.
Restart the server in normal mode
its a member server now but AD entries are still there. Promote teh server to a fake domain say ABC.com and then remove gracefully using DCpromo. Else after restart you can also use ntdsutil to do metadata as told in teh earlier post

21. What can you do to promote a server to DC if you’re in a remote location with slow WAN link?

Windows admin interview questions (includes Vista)


First available in Windows 2003, you will create a copy of the system state from an existing DC and copy it to the new remote server. Run "Dcpromo /adv". You will be prompted for the location of the system state files

20. What are the requirements for installing AD on a new server?

Windows admin interview questions (includes Vista)



An NTFS partition with enough free space (250MB minimum)
· An Administrator's username and password
· The correct operating system version
· A NIC
· Properly configured TCP/IP (IP address, subnet mask and - optional - default gateway)
· A network connection (to a hub or to another computer via a crossover cable)
· An operational DNS server (which can be installed on the DC itself)
· A Domain name that you want to use
· The Windows 2000 or Windows Server 2003 CD media (or at least the i386 folder)

From the Petri IT Knowledge base. For more info, follow this link:

19. What is the ISTG? Who has that role by default?

Windows admin interview questions (includes Vista)



Intersite Topology Generator (ISTG), which is responsible for the connections among the sites. By default Windows 2003 Forest level functionality has this role. 
By Default the first Server has this role. If that server can no longer preform this role then the next server with the highest GUID then takes over the role of ISTG.

Windows 2000 Domain controllers each create Active Directory Replication connection objects representing inbound replication from intra-site replication partners. For inter-site replication, one domain controller per site has the responsibility of evaluating the inter-site replication topology and creating Active Directory Replication Connection objects for appropriate bridgehead servers within its site. The domain controller in each site that owns this role is referred to as the Inter-Site Topology Generator (ISTG).

18. What is the KCC?

Windows admin interview questions (includes Vista)



With in a Site, a Windows server 2003 service known as the KCC automatically generates a topology for replication among the domain controllers in the domain using a ring structure.Th Kcc is a built in process that runs on all domain controllers.
The KCC analyzes the replication topology within a site every 15 minute to ensure that it still works. If you add or remove a domain controller from the network or a site, the KCC reconfigures the topology to relect the change.

KCC is Knowledge Consistency Checker, which creates the connection object that links the DCs into common replication topology and dictates the replication routes between one DC to another in Active Directory forest.

17. What’s the difference between a site link’s schedule and interval?

Windows admin interview questions (includes Vista)

Any time two networks are separated by links that are heavily used during parts of the day and are idle during other parts of the day, put those networks into separate sites. You can use the ability to schedule replication between sites to prevent replication traffic from competing with other traffic during high usage hours.
In simple words you can define it as the time when you allow the replication to happen.
Interval is also a part of schedule but it takes cares of the replication polling frequency. In other words in a said schedule of say 9:00 AM to 1 PM replication polling shuld occur in every 15 minutes.
Schedule here is 9:00 AM to 1 PM
Interval is every 15 minutes.