In 2011, Lockheed Martin introduced a concept called Cyber Kill Chain. It outlines the following 7 steps of a cyber attack: 1) Reconnaissance 2) Weaponization
Author: penguyen
Thoughts on Information Security and Compliance
In today’s industry, being in compliance doesn’t make a company secured. Being in compliance means a company met the minimum requirement or have workarounds for
Windows Update unable to detect new updates
We ran into an issue with Windows Update where it failed to detect new updates. Below is a Msft article which I copied and pasted
SCCM – Creating Device Collection using OU
Query: select SMS_R_SYSTEM.ResourceID,SMS_R_SYSTEM.ResourceType, SMS_R_SYSTEM.Name, SMS_R_SYSTEM.SMSUniqueIdentifier, SMS_R_SYSTEM.ResourceDomainORWorkgroup,SMS_R_SYSTEM.Client from SMS_R_System where SMS_R_System.SystemOUName = “DOMAIN.LOCAL/OU1” If you have sub-OUs, and would like to exclude those sub-OUs from your
SCCM: Logs to check when troubleshooting software updates.
Server Side Software Update Logs: SUPsetup.log – Installation of SUP Site Role. WCM.log, WSUSCtrl.log – Configuration of WSUS Server/SUP. WSyncMgr.log – SMS/WSUS Updates Synchronization Issues.
Troubleshooting Rapid Growth in Databases and Transaction Log Files in Exchange Server 2007 and 2010
I found this blog from the technet site. Just copied and pasted here in case the blog won’t be available for future use. Link to
You must be logged in to post a comment.