Local Administrators Automated Reporting Tool

Mick's IT Blog

Back in November 2016, I posted the blog entry on reporting local administrators on machines. That script is deployed to machines via an SCCM package that reports the local administrators back to SCCM to be able to be queried into a report.

Tools 105

Event 51 Drive Failure Reporting Tool

Mick's IT Blog

I decided to write a reporting tool for this event so that IT professionals will be aware of this error before a complete failure occurs and there is data loss along with losses in production time. Last year, we had a high level executive that started having slowness and extended drive usage.

Tools 88

Trending Sources

MDT Build Reporting Tool

Mick's IT Blog

I used their information and function to expand the process into a full fledged reporting tool. This tool will email the appropriate IT staff when a build successfully completes, fails, unknown error, or continues running over a designated time frame.

Tools 63

Tools for Building Professional Cloud Architecture Diagrams

IT Pros Rock!

Using the tools described in this article, you can quickly build professional architecture diagrams for cloud scenarios. These tools are also useful when creating presentation decks, training materials, whitepapers and infographics.

Morpheus – Man-in-the-Middle Security tool

Doctor Chaos

Introducing Morpheus Morpheus is a new tool that provides you with the ability to simulate automated Man-in-the-Middle attacks. Hacking Tools hacking toolsMorpheus can be found at https://github.com/r00t-3xp10it/morpheus. The Morpheus application consists of a suite allowing users to manipulate TCP and UDP data packets using a few applications in the background such as ettercap, urlsnarf, msgsnarf and tcpkill. The […].

Tools 27

RSAT tools for Windows 10

CanITPro

Hello Folks, It’s now expected that soon after the release of a new client OS, we release a new set of server management tools. Well, wait no more the Remote Server Administration Tools for Windows 10 have been released. These tools includes.(

Top 5 Business Intelligence Tools of 2017

IT Toolbox

This post looks at a few of the top BI tools for 2017

Truly Useful Artificial Intelligence Tools You Can Use Today

CTOvision

We know you, dear readers, have been tracking the megatrend of artificial intelligence. There are many issues in this trend that should inform your day-to-day decision-making (we examine AI issues as part of our CAMBRIC construct to help put the trend in the context of other major thrusts in the tech world). Most AI solutions today are fielded by the big players in IT.

Assessing the FFIEC Cybersecurity Assessment Tool

CTOvision

On 30 June 2015 the FFIEC released a new Cybersecurity Assessment Tool. This tool is intended to help financial organizations large and small better assess and understand risk and also the organization's maturity in cyber defense. Here are more thoughts: The tool has two parts.

Tools 67

Analysts, Tools, and Complexity

CTOvision

By AdamElkus CTOs and analysts of all stripes know that understanding the problem they are trying to solve should precede selecting analytical tools. Page has a useful distinction between all of these that can help us match tool to problem.

Tools 47

10 advanced endpoint protection tools

Network World

Endpoint protection The days of simple endpoint protection based on traditional anti-malware tools are over. There are now advanced endpoint detection and response (EDR) tools that go beyond proactive monitoring and endpoint protection.

Tools 32

Variety in collaboration tools is not a curse!

CTOvision

New collaboration tools come with apps that simplify integration with other enterprise systems. Collaboration tools are proliferating and this complicates adoption of a universal enterprise collaboration platform. Add to the above the need for internal groups to collaborate with external groups and it's understandable why a fallback tool for collaboration continues to be good old email -- which everyone agrees is pretty much an awful tool for collaboration. Dennis D.

Tools 22

Leveraging The FFIEC Cybersecurity Assessment Tool (CAT) To Improve Corporate Culture and Raise Security Posture

CTOvision

On 30 June 2015 the FFIEC released a new Cybersecurity Assessment Tool. This tool is intended to help financial organizations large and small better assess and understand risk and also the organization's maturity in cyber defense. Here are more thoughts: The tool has two parts.

5 must-have security tools

Network World

New York’s Montgomery County, located at the foot of the Adirondacks, consists of 10 towns, one city and 50,000 residents. To protect the data that pertains to its citizens and operations, Montgomery County added DatAdvantage from Varonis to its arsenal of security wares. The data security platform is designed to show organizations where sensitive data exists, who is accessing it, and how to keep it safe.

Windows Updates Reporting Tool

Mick's IT Blog

My firm uses MDT to build all of our computers. The windows updates are setup as packages so they can be applied to the OS before it is laid down on the PC. MDT will then download any new updates and apply them to the PC after the OS has been laid down.

Tools 33

Jihadists’ digital tools revealed

Computer Weekly

A report by dark web intelligence firm Flashpoint reveals how jihadist groups use common security and other tools to hide their digital communications from national security forces

Server and Storage I/O Benchmark Tools: Microsoft Diskspd (Part I)

Storage IO Blog

benchmark) tool that runs on various Windows systems as an alternative to Iometer, vdbench, iozone, iorate, fio, sqlio among other tools. Diskspd is a command line tool which means it can easily be scripted to do reads and writes of various I/O size including random as well as sequential activity. Microsoft Diskspd is a synthetic workload generation (e.g.

Data 34

EternalRocks network worm uses 7 NSA hacking tools

Network World

At least one person is leveraging seven leaked NSA hacking tools for a new EternalRocks network worm. While you won’t be forgetting the WannaCry ransomware attack, it is likely you will be hearing a lot more about the alleged NSA-linked EternalBlue exploit and DoublePulsar backdoor as it seems a wide range of bad guys have them in their toyboxes.

SMB 27

EternalRocks worm combines seven leaked NSA attack tools

Computer Weekly

Hard on the heels of the WannaCry ransomware attacks, a researcher has found a worm that combines four NSA exploits and associated attack tools, including EternalBlue used by WannaCry

Carbanak shows how attackers hijack legitimate tools

Computer Weekly

Criminal gang’s abuse of Google services highlights the trend of attackers using legitimate tools to launch and manage attacks

Inside 3 top threat hunting tools

Network World

Taking down the threat Image by Thinkstock Advanced Persistent Threats (APT) are able to slip past even the most cutting-edge security defenses thanks to a diabolically clever strategy. Hackers may try to breach your defenses thousands of times until they finally get in.

Tools 31

9 essential tools for the security-conscious mobile worker

Network World

Have security gadgets, will travel Image by Kensington, Anonabox, Yubikey The highly digitized and hyper-connected world that we live in today has heightened the security stakes for us all.

Velocity with quality mandates a model based approach to ARA tools and DevOps

Forrester IT

ARA tools are designed to remove errors from manual processes by standardizing and automating the movement of applications with middleware and infrastructure - the critical final step in the delivery pipeline of applications to deliver customer value. Read more Categories: ARA Tools. ARA Tools Agile Application Release Automation Automation DevOps IT Infrastructure Models cloud computingDevOps velocity mandates change velocity.

How to assess security automation tools

Network World

His insight is worth repeating for anyone looking to add automation tools to their security toolset. This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. During my recent trip to Tel Aviv to attend CyberTech 2017, I had a one-on-one conversation with Barak Klinghofer , co-founder and CTO of Hexadite. He gave me a preview of an educational presentation he was to give two weeks later at the RSA Conference.

Are Your Agency’s Management Tools Defeating Your Efforts?

CTOvision

Poor employee performance might be a result of poor choice of tools. Most frequently, a poor choice of project management tools is to blame. There are too many tools out there that serve only to obfuscate workflows - I am going to tell you how to recognize and avoid them. Seek out the tools that most closely match your requirements. AJ Morris. Here are a few signs it might be time to look for some new ones. What does your agency’s workflow look like?

Hitachi Tools Use Big Data for Data Center Automation

Data Center Knowledge

HDS launches series of management tools for IT ops, expands hardware lineup Read More. Blades

Step-by-Step: Microsoft Azure Virtual Machine Readiness Assessment Tool

CanITPro

virtual machine Azure Virtualization tool Assessment how-toMoving to the cloud can be a daunting task, and sometimes it is hard to know where to start. You may have questions like w hat workloads can be moved? W hat workloads can't? W hat can be moved after some modifications? The Azure Virtual Machine.( read more ).

Tools 24

Mobile, security tools among education tech favorites

Network World

In the school district of La Crosse, Vicki Lyons depends on mobile device management software from Jamf to manage the Wisconsin district’s fleet of iPads and MacBook Air devices. The Apple device management platform plays a key role in the district’s efforts to provide equitable access to technology to all of its students. “We We use Jamf Pro as our device management solution for our 1:1 iPad program district-wide.

Review: Top tools for preventing data leaks

Network World

Most security tools are focused on keeping external attackers at bay. DLP tools are designed to block protected data from being shared in various ways, everything from e-mail attachments to printing to even screen captures. But what about the sensitive data that lives inside your network? How do you make sure it doesn’t get out, either intentionally or by accident? That’s where Data Loss Prevention (DLP) comes into play.

Entrepreneur or Startup? Succeed with FREE access to Cloud Services, Software and Tools

IT Pros Rock!

Microsoft BizSpark helps qualifying software startups succeed by providing free access to Microsoft cloud services, software and tools for three (3) years.

How to Select the Right Cloud Management Tools

Data Center Knowledge

Without the right management tools your go-to-market strategy can suffer. Your infrastructure, including your data center and your cloud, are the heart of your business. Read More. Cloud Computing Enterprise cloud management

MSI Analysis Reporting Tool

Mick's IT Blog

Here is a tool I have written that generates a report on all of the variables used for each entry during an MSI installation. I wrote this script to make customizing the installation of MSI files much easier and quicker.

Shadow Brokers dump contained Solaris hacking tools

Network World

After the Shadow Brokers group opened up its archive of exploits allegedly stolen from the United States National Security Agency, security experts found a nasty surprise waiting for Solaris administrators. The Register reported that the dumped Shadow Broker files reference two programs, EXTREMEPARR and EBBISLAND, that would let attackers obtain root access remotely over the network on Solaris boxes running versions 6 to 10 on x86 and SPARC architectures.