News Categories
Announcement (9) Amy Babinchak (64) Tips (1) SBS 2011 (6) Windows Essentials 2012 (4) Edwin Sarmiento (28) SQL Server (22) SQL Server 2012 (6) SQL Server Clustering (3) SQL Server Disaster Recovery (6) Windows Server 2008 Clustering (1) log shipping (1) Brian Higgins (3) Uncategorized (42) Hyper-V (67) Virtualization (13) Windows 8 (13) Cisco VPN Client (1) Windows Server 2012 (24) Friend of TT (4) Hangout (2) Office365 (4) DNS (8) Jeremy (7) Cliff Galiher (3) Active Directory (12) ClearOS (4) Linux (4) presentations (2) SQL PASS (6) Chris Matthews (4) Printers (2) SharePoint (8) SQL Server Administration (7) Windows PowerShell (3) recovery model (1) sql server databases (1) Dave Shackelford (7) SMB Nation (1) Steve (1) Boon Tee (5) Kevin Royalty (3) Lee Wilbur (2) Philip Elder (10) SMBKitchen Crew (31) Susan Bradley (15) AlwaysOn (1) AlwaysOn Availability Groups (4) readable secondaries (1) row versioning (1) undocumented (1) The Project (2) Webinar (3) Enterprise for SMB Project (9) Security (25) Remote Desktop Connection for Mac (1) Remote Desktop Services (8) Windows Server 2008 (1) Exchange (15) Powershell (6) Microsoft (15) Performance (7) data types (1) Server 2012 (1) monitoring (1) DevTeach (1) SQL Server High Availability and Disaster Recovery (5) Clusters (44) Hyper-V Server 2012 (2) Business Principles (26) Cost of Doing Business (13) DHCP (7) sbs (15) Windows Server (30) SMBKitchen (26) Windows Server 2008 R2 (4) StorageCraft (1) P2V (1) ShadowProtect (6) StorageCraft ShadowProtect (1) VHDs (1) Intel RAID (2) Intel Server System R2208GZ (1) Intel Server Systems (17) RAID (2) SAS (2) SATA (2) Server Hardware (12) Microsoft Licensing (2) OEM (2) System Builder Tips (4) Intel (5) Intel Channel Partner Program (4) Intel Product Support (10) Intel Server Boards (2) Intel Server Manager (2) Cloud (26) IT Solutions (2) On-Premises (20) SMB (9) WIndows Azure (2) StorageSpaces (1) Error (47) Error Fix (35) Intel Desktop Boards (2) Intel SSDs (2) SSD (2) Business Opportunity (17) Data Security (11) Identity Security (7) Information Security (14) Privacy (2) Intel Modular Server (6) Promise (2) Storage Systems (9) Live ID (2) Microsoft ID (4) User Profiles (2) Articles (2) Building Client Relationships (6) DBCC IND (2) DBCC PAGE (2) filtered indexes (2) SQL Server Index Internals (2) training (11) Adobe (3) Internet Street Smart (8) Intel Storage Systems (2) LSI Corp (2) LSI SAS6160 Switch (2) Storage Spaces (7) Firmware Update (2) Product Support (7) Hybrid Cloud Solutions (3) Server Core (2) MAXDOP (1) SharePoint 2013 (1) SharePoint best practices (1) SQL Server Authentication (1) Family (5) Alternatives (1) SBS 2011 Standard (4) Microsoft Small Business Specialist Community (2) Microsoft Surface (2) SBSC (2) Networking (4) Availability Groups (3) CANITPro (1) HA/DR (1) Step-By-Step: Creating a SQL Server 2012 AlwaysOn Availability Group (1) webcast (1) VMWare (2) Conferences (2) Client Focus (2) Disaster Recovery (6) Error Workaround (8) Troubleshooting (4) Logitech (2) Product Review (7) Windows Features (4) XBox Music (2) SBS 2008 All Editions (4) MDOP (2) Microsoft Desktop Optimization Pack (2) Software Assurance (2) W2012E (6) Windows Server 2012 Essentials (6) Internet Explorer (3) USB 3.0 (2) USB Hard Drive (2) Bug Report (2) Microsoft Office 365 (5) sharepoint online (2) BitLocker (2) Windows (2) Microsoft Update (3) Swing Migration (2) Windows Update (4) Outlook (2) Group Policy (9) WS2012e (2) WSUS (3) Office (3) Microsoft Downloads (5) Microsoft Office (3) DRP (3) Virtual Machines (2) Virtual Server Hardware (2) online course (1) SQL Server learning (7) 2 Factor Authentication (2) 2FA (2) PASS Summit 2013 (4) SQLPASS (5) Contest (1) e-learning (1) Udemy (1) smbtechfest (1) backups (2) PASS Summit First Timers (3) IIS (2) RD Gateway (4) RD RemoteApp (2) RDWeb (4) Remote Desktop Connection (2) Remote Web Access (2) Remote Web Workplace (2) Cryptolocker (6) Backup (4) Restore (2) CryptoLocker (1) AuthAnvil (1) SBS 2003 (1) SBS Migration (1) Windows Server 2012 R2 (9) Documentation (1) IE 11 (4) testimonials (11) SQL Server 2008 (1) Best Practices (1) Support (1) Intel Xeon Processor (1) RemoteApp (1) Android (1) iOS (1) Hyper-V Replica (2) PowerShell (2) SBS (3) Break (1) Business Intelligence (1) Excel 2013 (1) Power Map (1) Power Query (1) PowerBI (1) MultiPoint (2) Surface (1) Net Neutrality (1) Opinion (2) ASP (9) HP (2) Scale-Out File Server (8) SOFS (10) Windows Phone (1) Updates (1) Intel NUC (1) Intuit (1) QuickBooks (1) Office364 (1) Intel Server Systems;Hyper-V (1) Firewall (1) Patching (1) Mobile (1) Mobility (1) sharepoint (1) Microsoft Security (1) Beta (1) Storage Replication (1) outlook (1) Hyper-V Setup (3) JBOD (1) Azure (1) PCI (1) PCI DSS (1) PII (1) POS (1) MicroStaff (2) Catherine Barr (2) Third Tier (1) BeTheCloud (1) BrainExplosion (1) LookAWhale (1) Manuel (1) Rayanne (3) SuperSecretNews (1) TechYourBooks (3) Managed Services (1) Training (1) E-mail (1)
RSS Feed
News
Nov
10
4 ways to thwart Ransomware in Windows 10
Posted by Amy Babinchak on 10 November 2017 11:02 AM

 

4 protections

Windows 10 Fall 2017 (version 1709) has introduced some excellent new features for protecting against ransomware. Using Windows Defender the big 4 features are Exploit Protection, Attack Surface Reduction (formerly EMET), Network Protection and Controlled Folder Access. Together they mount for formidable defense.

Block Ransomware

But…

There’s a big caveat in this whole protection scheme. You must have Windows Defender as your primary anti-virus solution and you’ll be best protected if you use Edge. If you just cringed, it is time to throw out your preconceived notions about Defender and Edge and take a fresh unprejudiced look. The protections in Defender are quite significant and worth youy time to implement, configure and use.

None of these feature are configured out of the box. They have to be turned on and configured with group policy or powershell. Some of them require the building of while lists to make them user friendly. You won’t be deploying this without first developing your plan.

Ransomware Prevention Kit

We will be adding configuration for these features as the primary protection for Windows 10 in our Ransomware Prevention Kit. The paper is written. The field testing is in progress. Meanwhile take a fresh look at Defender. I think you’ll come away realizing that it’s come a long way since its introduction and Microsoft is serious about protecting Windows from invaders.

_____________________________

About Third Tier

Established in 2008, Third Tier only works for IT Professionals by providing them with access to advanced support services. No one can know it all these days, so we give IT pros a place to go to get the hands on support they need in areas they normally don’t work in or problems they’ve never encountered. We also work on projects, fix their accounting practices and do many, many migrations and other installations. Our staff covers a wide range of technologies.

Website: http://www.thirdtier.net

Helpdesk: https://helpdesk.thirdtier.net

Blog: http://www.thirdtier.net/blog


Read more »



Nov
1
Corrected: Amy on Cyber Security podcast
Posted by Amy Babinchak on 01 November 2017 02:02 PM

Correction: Embed code fail. It was beautiful in the preview! Alas, I've now just included the link to the podcast for you.

I was recently a guest on M2TechCast. It's a podcast on technical topics for businesses. I spoke about cyber security. It's a 12 minute segment aimed mostly a small business people that are somewhat technical. For a hyper-local podcast is a has a good following of about 6,000.  You can listen to it here

https://soundcloud.com/podcastdetroit/m2techcast-episode-101-nicole-passuit-tech-stack

About Third Tier

Established in 2008, Third Tier only works for IT Professionals by providing them with access to advanced support services. No one can know it all these days, so we give IT pros a place to go to get the hands on support they need in areas they normally don’t work in or problems they’ve never encountered. We also work on projects, fix their accounting practices and do many, many migrations and other installations. Our staff covers a wide range of technologies. Use us to help your staff get more done.

Website: http://www.thirdtier.net

Helpdesk: https://helpdesk.thirdtier.net

Blog: http://www.thirdtier.net/blog



Read more »



Oct
25
Use Flow make document approval easy (finally)
Posted by Amy Babinchak on 25 October 2017 10:51 AM

 

Originally published on TechGenix.com where I write articles a couple of times a month. - Amy

There are many features that you get access to when you use a document management application like SharePoint that you just don’t have in a server file share. One of them is the ability for the owner of a file to be notified when a change has been made to the file. This is especially useful for official corporate documents or templates, for example. SharePoint has had the document approval feature for many years, but it has always been cumbersome. The process involved visiting the document library, looking at the properties of a file, going to the “more” option, then “approvals,” then approving the change. If you were managing any more than a small handful of files with infrequent changes, it would become a hated task in short order. An improvement to this process was needed, and now we have one in Microsoft Flow.

Setting up an Approval Request using Flow makes the whole process automatic and simple. Read the rest of the article on our blog

Automatic approvals

About Third Tier

Established in 2008, Third Tier only works for IT Professionals by providing them with access to advanced support services. No one can know it all these days, so we give IT pros a place to go to get the hands on support they need in areas they normally don’t work in or problems they’ve never encountered. We also work on projects, fix their accounting practices and do many, many migrations and other installations. Our staff covers a wide range of technologies.

Website: http://www.thirdtier.net

Helpdesk: https://helpdesk.thirdtier.net

Blog: http://www.thirdtier.net/blog


Read more »



Oct
6
How to buy yourself time when under back-pressure
Posted by Amy Babinchak on 06 October 2017 12:00 PM

under back-pressure

One of the important skills in being a great tech is knowing how to keep things running while you sort out the root of the problem. Being able to work with outside resources like Third Tier depends on this skill. From Catherine Barr, one of our technical experts…

As the song Under Pressure by Queen plays through my head, I’d like to share a tip on how to buy yourself some time.

More than a few times techs have been plagued with server hard drives running low on resources. We all have those risk taking clients that treat their systems like a car and like to take a chance of driving on empty to see how far they can get with the gas light flashing brilliantly in their eyes. When the system finally starts to red line then you get the call.  If this happens to be an email server then you know that email flow will stop due to back pressure restrictions.

Back pressure is a process Microsoft built in to Exchange for system resource monitoring to keep the server from having a nervous breakdown. For example, on a Small Business Server email flow will stop when drive space is pushed to the limit and becomes limited. There have been times when facing this problem isn’t as easy as deleting logs or moving data to a different drive.

If you get a call from a client who has Exchange on-premises and complains about email flow problems then one of the first things you should check is hard drive space. If you know or find this to be the problem but need a bit of time to solve then a quick fix is to disable the back pressure.

Here are examples of how this could be done in Exchange 2007 or Exchange 2010.

Exchange 2007 (Default install to C drive) C:\Program Files\Microsoft\Exchange Server\Bin

Exchange 2010 (Default install to C drive) C:\Program Files\Microsoft\Exchange Server\v14\Bin

Modify a config file where your Exchange program files are installed. The config file is called edgetransport.exe.config. Probably best to make a backup copy of it first then open it in notepad. Search for “EnableResourceMonitoring”. Change the value from “True” to “False”. Save the file back to the same name config. The final step is to restart the Microsoft Exchange Transport Service. Email should start to flow again making the client happy and giving you time to solve the issue at hand.

About Third Tier

Established in 2008, Third Tier only works for IT Professionals by providing them with access to advanced support services. No one can know it all these days, so we give IT pros a place to go to get the hands on support they need in areas they normally don’t work in or problems they’ve never encountered. We also work on projects, fix their accounting practices and do many, many migrations and other installations. Our staff covers a wide range of technologies.

Website: http://www.thirdtier.net

Helpdesk: https://helpdesk.thirdtier.net

Blog: http://www.thirdtier.net/blog


Read more »



Oct
5
Creating a digial suggestion box using Office 365 apps
Posted by Amy Babinchak on 05 October 2017 02:35 PM

I recently wrote an article for TechGenix on how to use Sharepoint, Flow and Forms to create an online Suggestion Box. Once completed you could even embed it into your website if you’d like to.

A client wanted an anonymous digital suggestion box and was vetting various software packages when I heard through the office grapevine that this was occurring. My mind went immediately to Microsoft Forms, and I informed them to hold off because they already owned something that was going to work for this. Shadow IT is a real thing in businesses today where savvy employees are apt to solve their own problems through an Internet search rather than asking IT for their suggestions, so keeping an ear out for needs has become an essential part of a successful IT department.

Read the entire article over here: http://techgenix.com/designing-a-digital-suggestion-box/

About Third Tier

Established in 2008, Third Tier only works for IT Professionals by providing them with access to advanced support services. No one can know it all these days, so we give IT pros a place to go to get the hands on support they need in areas they normally don’t work in or problems they’ve never encountered. We also work on projects, fix their accounting practices and do many, many migrations and other installations. Our staff covers a wide range of technologies.

Website: http://www.thirdtier.net

Helpdesk: https://helpdesk.thirdtier.net

Blog: http://www.thirdtier.net/blog


Read more »



Sep
27
How to fix a business process with Office 365
Posted by Amy Babinchak on 27 September 2017 12:12 PM

All businesses have processes that are broken. You know it when multiple people are doing multiple things in multiple places to get a particular task complete. Ask around, I’m sure that your business has a few broken processes. Mine did. Our broken business process was related to tracking the purchases that we make for clients. I noticed a lot of email flying back and forth from different people asking for things.

“could you send me the receipt for __________”, “who did you buy ____________ for”, “what was the RMA# for _________”, “can you send me the quote for this order?” and on and on. This is how you know you have a broken process.

I wrote an article for TechGenix that starts with these paragraphs then continues to show you how to solve this problem using SharePoint, Flow and PowerApps. It's a very nice solution and once you implement a solution like this for a client they will think of many more processes that need fixing. 

Read the full article here

About Third Tier

Established in 2008, Third Tier only works for IT Professionals by providing them with access to advanced support services. No one can know it all these days, so we give IT pros a place to go to get the hands on support they need in areas they normally don’t work in or problems they’ve never encountered. We also work on projects, fix their accounting practices and do many, many migrations and other installations. Our staff covers a wide range of technologies.

Website: http://www.thirdtier.net

Helpdesk: https://helpdesk.thirdtier.net

Blog: http://www.thirdtier.net/blog


Read more »




Help Desk Software by Kayako Fusion