Dell BIOS Reporting Tool

Mick's IT Blog

You will want to run this in SCCM in order to find the systems with the latest BIOS version to generate the report on. Recently, we ran into a problem when we discovered some of the newer laptops were not automatically disabling the WiFi when connected to ethernet.

Dell 98

Local Administrators Automated Reporting Tool

Mick's IT Blog

Back in November 2016, I posted the blog entry on reporting local administrators on machines. That script is deployed to machines via an SCCM package that reports the local administrators back to SCCM to be able to be queried into a report.

Tools 105

Trending Sources

MDT Windows Updates Build Report

Mick's IT Blog

I found it nice to be able to get a clean, filtered report on what Windows updates got installed during the build process. The tool has given me a report, but there were times I forgot to look at it after a build completed. This reminds me by sending the report out via email.

Report 100

Trusted Sites Report

Mick's IT Blog

I wrote this PowerShell script that will generate a report listing all trusted sites. It separates those in the report. The report is displayed on the screen with the option to write it to a text file by specifying the FileOutput parameter switch. Recently, we had to add a new trusted site to the trusted sites GPO. As you may know, if the GPO contains a lot of trusted sites, it can be cumbersome to determine if a site is in there.

Event 51 Drive Failure Reporting Tool

Mick's IT Blog

I decided to write a reporting tool for this event so that IT professionals will be aware of this error before a complete failure occurs and there is data loss along with losses in production time. Last year, we had a high level executive that started having slowness and extended drive usage.

Tools 88

Malicious email spikes in Q2, reports Proofpoint

Computer Weekly

Malicious email campaigns saw a spike in volume and increased variety in the second quarter of 2017, a cyber security report reveals

PowerShell: Installed Applications Report

Mick's IT Blog

The purpose of this report is so the build team has a concise list of optional applications they need to install during a replacement build for a user. This file contains a list of the applications you do not want to be included in the report. The application in the file need to be exactly how they appear in the report. You can copy and paste the apps from the report to the ExclusionList.txt file.

Application Build Reporting for MDT and SCCM

Mick's IT Blog

The purpose of this is to generate a report that is easy to open and see if all applications were successfully installed. One more thing I do in my reference image task sequence is to suspend the imaging process so I can check this report before a reference image is generated.

MDT Build Reporting Tool

Mick's IT Blog

I have been wishing for a reporting system to which MDT would automatically email IT staff when a build is finished. I used their information and function to expand the process into a full fledged reporting tool.

Tools 63

The Startup Ecosystem Report

CTOvision

Compass , the startup data benchmarking company, has just released their second “ Startup Ecosystem Report ”. It has been three years since their prior report. The post The Startup Ecosystem Report appeared first on CTOvision.com.

Technology Context From the Verizon Data Breach Investigations Report (DBIR)

CTOvision

For a decade now the cyber security community has been treated to important strategic context coordinated by Verizon in their Data Breach Investigations Report (DBIR). Background: - The point of this report is to support evidence-based risk management. By Bob Gourley.

ACC Foundation Releases Extensive State of Cybersecurity Report

CTOvision

The Association of Corporate Counsel (ACC) Foundation has released the largest study of its kind on corporate cybersecurity, the result of the study is: The State of Cyber Security Report. The report highlights cybersecurity issues for more than 1,000 corporate lawyers at 887 organizations worldwide. The State of Cyber Security Report addresses: One-third of in-house counsel have experienced a data breach. Katie Kennedy.

PowerShell: Cached Exchange Mode Status Reporting

Mick's IT Blog

I decided to write this PowerShell script in which it will report back to SCCM via WMI the status of cached exchange mode. It will iterate through all all HKEY_USER profiles to get the status of the exchange mailboxes and reports each to SCCM.

Internet Trends Report: Five ITSM Takeaways

Data Center Knowledge

While this report focuses on major internet trends, there are several technologies like AI, machine learning, analytics and IoT that are expected to be big game changers in the future of ITSM. Read More. Industry Perspectives

DDOS Trends Report 2016

CTOvision

The Verisign Distributed Denial of Service (DDoS) Trends Report contains the observations and insights derived from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services, and the security research of Verisign iDefense Security Intelligence Services. Download the full report at this link: Download “DDOS Trends Report 2016” Verisign_report-ddos-trends-Q22016.pdf – Downloaded 439 times – 3 MB.

Implementing IGMP Membership Reports

IT Toolbox

Because the standard specifies that the report for each host group should be delayed a random time, igmp_settimers calls function hgrand to compute a delay

Industrialised cyber crime disrupting business, report reveals

Computer Weekly

A majority of businesses do not comprehend the methods and motivations of cyber attackers or fully understand the scale of the threat, a BT-KPMG report reveals

ICO reports record number of data breaches and fines

Computer Weekly

The UK privacy watchdog reports that it has dealt with more data breach reports and issued more fines in the past year than ever before

Most cloud applications not GDPR-ready, report reveals

Computer Weekly

Just 2% of more than 15,000 enterprise cloud application analysed are GDPR-ready, according to a cloud risk report

McAfee report reveals five challenges to cyber threat intelligence

Computer Weekly

McAfee Labs’ latest report details the challenges facing threat intelligence sharing efforts and reveals growing trends in malware, ransomware, mobile malware and other threats

Report: Microsoft Eyeing Phoenix Data Center Build

Data Center Knowledge

Local media report company pushing for wider data center tax breaks, citing Arizona lawmaker Read More. Microsoft Phoenix

Media 89

Cyber security breaches reported to ICO double in a year

Computer Weekly

An increase in cyber security incidents reported to the Information Commissioner’s Office is further evidence of the need to shift to automated, artificial intelligence-led defences, says Huntsman Security

Report Confirms Large Cloud Providers Drive Q1 Leasing

Data Center Knowledge

The NADC report confirmed that it was Microsoft that leased 22 MW in Ashburn, VA, plus another 9 MW in San Antonio from data center REIT CyrusOne. Read More. Cloud Computing Featured

Report: VMware, AWS Mulling Joint Data Center Software Product

Data Center Knowledge

No details yet, but hybrid cloud product most likely Read More. Amazon Business Cloud VMware

McKinsey finds hard work to do in Big Data Revisited report

Computer Weekly

The McKinsey Global Institute has revisited its path-breaking 2011 big data report, finding a new salience for machine learning, and most companies under-capitalising their data

Business has critical role in fighting cyber crime, says report

Computer Weekly

The National Crime Agency is calling for a stronger collaboration between business and law enforcement to fight cyber crime in the light of a report produced with private sector partners

Report: Data Center Leasing Surged 25 Percent in 2013

Data Center Knowledge

Data center demand from social media companies and cloud-builders contributed to a surge in leasing of wholesale data center suites in 2013, with total leasing volume up about 25 percent from 2012, according to a report from a real estate firm.

Crest report outlines ways to address cyber security gender gap

Computer Weekly

Report on the causes and potential remedies for addressing the gender gap in cyber security is aimed at stimulating debate and co-operation in the industry

2015 Cyberthreat Defense Report Reveals Cyberattacks Rising and Confidence Sinking

CTOvision

The more fact-based reports based on forensics are much more important (this brings to mind what John Oliver said about opinions vs facts ). By Bob Gourley.

Data breaches affect all parts of business, Verizon report shows

Computer Weekly

Verizon’s second annual Data Breach Digest provides common scenarios to help organisations improve preparations for, and responses to, the most popular types of cyber attack

Smart farming, IoT only way to feed growing population, says Beecham report

Computer Weekly

A report from IoT sector analyst Beecham says the agricultural industry will need to embrace smart farming methodologies to support the growing human population

Report urges government tax breaks for cyber security investment

Computer Weekly

A report on improving cyber security in the financial industry makes several recommendations – including targeted tax breaks to stimulate investment

HPE report lays bare inner workings of cyber criminal economy

Computer Weekly

A Hewlett Packard Enterprise (HPE) report shows business how cyber criminals operate and how to disrupt them at each step of their criminal value chain