Month: January 2016

Second Biggest Mistake When Designing SSRS Reports

By Garth Jones The second biggest mistake that people often make when creating a report is putting too much data in it. Take the report below, this is an actual mock-up of a report requested by a client. What makes this report really interesting is that if it was printed it would be 48-inches wide! It is virtually impossible to scroll left to right and ensure what you are reading the same row. Instead, I always suggest breaking-up a really big report into smaller sections. In the mock-up I color-coded the sections, so that the client could see roughly how the final reports would look. The four sections worked out to: · Device Details · Patch Details · SCCM Client Details · Other Tools As I have worked with this client over the years, this initial report has morphed. It is now comprised of ...

Configuration Baseline Remediation: Part 2 – Create the Baseline

By Joseph Yedid In my last post I showed you how to create a Configuration Item to remediate the EnableLinkedConnections registry entry. Now that this is done, I can show you how I created the baseline and then deployed it. 1. In the Configuration Manager console, under the Assets and Compliance workspace, expand Compliance Settings and select Configuration Baselines. From the ribbon, click Create Configuration Baseline. 2. Give your new baseline a name. Click the Add drop-down button and choose Configuration Items. 3. Select the configuration item (in this case it’s the one I created in my previous post) and then click Add. 4. Click OK. Now the baseline is created. 5. Select the newly created baseline, and choose Deploy from the ribbon. 6. Select Remediate noncompliant rules when supporte...

Why do so Many IT Projects Fail

By Matthew Carr As an outsider, you might think that the IT industry is the goose that lays golden eggs and asks for nothing in return. And why shouldn’t you? So many countries have tax deductions for IT employees and employers alike, and all those who work in the field seem to live prosperous lives. While the industry seems to be thriving, the harsh truth is that it has its own problems, just like many other industries. Expensive projects fail everywhere and it’s often hard to pinpoint the cause or, better said, to pinpoint a single cause. In fact, research shows that only one in eight projects can be deemed successful; granted, in this context, successful projects are those that meet the deadlines, the quality requirements and the budget, so one might argue that even those that fail at o...

Configuration Baseline Remediation: Part 1 – Configuration Item

By Joseph Yedid In a previous blog post by Garth Jones, Where Are My Network Drives?, he encountered a situation where his network drives were not available to an application. Basically, the solution was to add the registry value below: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “EnableLinkedConnections”=dword:00000001 Garth did this for a single system, but what if you needed to do this for 100 systems? 1,000 systems? That’s a lot of manual work!! You could create a package and program in Configuration Manager to deploy the registry key, but what if you added new systems over time? There’s got to be a better way. Configuration Baseline remediation to the rescue! Now every new system that becomes a Configuration Manager client and is added to the correct c...

Help Choose Enhansoft’s Next Free SQL Server Reporting Services (SSRS) Report for the Month of February

The report choices in January’s poll are: Patch Compliance Progression by Collection OR List of PCs by Wakeup Type. VOTE HERE! a) For each PC within a collection, the Patch Compliance Progression by Collection report will provide you with a count of missing software updates (patches) and the last hardware inventory date. The deployed state report parameter allows you to select the deployed state of the software update. The deployed states are: Yes – The effected software update is deployed within your environment No – The effected software update is NOT deployed within your environment Both The status count parameter allows you to select whether or not expired software updates are included in the status count. In ConfigMgr, software updates that are expired are still listed. When complying...

Forefront Endpoint Protection – Synchronization of Definition Update Releases with WSUS/ConfigMgr

The following information can be used to reduce delays between the release of new FEP definition releases, and when the new definitions are available to WSUS/Configuration Manager. Delta FEP Definitions Released daily (every 8 hours) via Windows Update and WSUS at: 3 AM (EST) 11 AM (EST) 7 PM (EST)   Rebased FEP Definitions Released once a month. (“Patch Tuesday”) Includes antivirus and antispyware definitions Accumulation of previous months base file and delta definitions that were released since the previous rebase.   The frequency at which the updates are available to target computers is dependent upon a couple of factors: The frequency at which WSUS synchronizes with Windows Update. The process used for approving the updated definitions for deployment.     Reference...

January’s Free SSRS Report is Count of Service Account Names

Happy New Year! Thank you to everyone who voted in last month’s poll. The Count of Service Account Names report received 86% of the votes, so it becomes January’s free SSRS report. Make sure to email Info AT Enhansoft for your copy! The Count of Service Account Names report will display the total number of all accounts used to run a service. This report is useful prior to deleting a service account or changing its password because you can proactively see how many services use a particular account before making any updates. Stay tuned because tomorrow we will preview the reports in this month’s poll!

How can you prevent data leakage?

Every company stores data that it considers valuable or is covered by strict privacy requirements. Obviously, organizations must do everything to protect this data against any abuse or unauthorized use. A data breach not only results in direct financial damage for the organization, but also leads to loss of reputation. And now, with new legislation in place, companies can face heavy fines if personal data falls in the hands of hackers and those affected aren’t notified. According to the Verizon Data Breach Investigations Report, 20 percent of all data breach incidents come from insiders, and because these insiders have company knowledge and already have network access, they can do more damage than a hacker, which might now know where to look for confidential information. Of course, not all...

  • 1
  • 2