![]() I went into the discussion knowing what a SAN is, but after about five minutes I felt like I was in short pants and learning my ABCs. I recently had a talk with Apple’s Tom Goguen, director of server and storage software, about Xsan, the software-based SAN solution that Apple’s putting out in the fall for $999 per server. ![]() I read all sorts of interesting perspectives and opinions, so I wanted to get maybe some more perspectives on "Shadow. Hey Spicey peeps,I don't think I look at IT the same as many other IT leaders do, but I also don't believe most IT leaders think alike. ![]() How do you all address Shadow IT? (aside from rules/restrictions, more Culture) IT & Tech Careers.The final decision will probably be made late next week, March30 or 31. The companies that we have chosen through an RFP process have all said they would like me to stay involved longer than April 14. Hi!As I mentioned, I am retiring mid April. I am retiring, organization is tranistioning to managed services.Snap! - Cybersecurity Burnout, Lunar Lander, Exploding Flash Drives, Trashbots Spiceworks Originalsįlashback: March 22, 2005: WSUS (Windows Server Update Services) was introduced (Read more HERE.)īonus Flashback: March 22, 1960: Laser Beams Patented (Read more HERE.).Hello, would anyone help me out with this kind of technical issue? Very appreciate.I'm a new IT guy to server raid, I got two dummy questions:1) Server A has 5 disks with Raid-5 configuration, if I shutdown server A, unplug all these 5 disks, and then. RAID configuration transferrable? Hardware.But as I said unless it's persistent I don't worry about it. I only pay attention to ones that have valid user names or repeatedly hit the same source with the same MAC address. Seriously external attacks happen 24/7 it would be a full time job to keep on top of all of it. Of course change that users password and make sure it's a strong one. I would just block the ports and not worry about it. Now you have something fishing at your firewall. ![]() It may be the user ID in question sent a password in clear text and it was compromised. SO they are external request, yes it's totally possible and feasible that something was installed on the iPhone. Is it possible they installed something on their iPhone that is doing this?įorget about Xsan, it does not broadcast outside it's own network. The user name shown is for a user that is on vacation and has not responded to phone calls or e-mails. Since that user's account is now disabled, the login attempt fails with that reason. Always the same user name attempting to log in. The requests are coming from the outside. We do not have Xsan or an computers running the Apple OS. Some help on what this is all about and do I need to be concerned would be appreciated. The events still persist, but it makes me feel a little better - not much safer though. I have since disabled that user account on the network until I find out what is going on. None of the others are throwing security errors in my server event logs. I do have a number of users that access their e-mail and have iPhones, including this user. In researching these ports, they all appear to be used by Apple Xsan. The addresses are not local IP addresses. The source IP address will stay the same for an hour or two, then change to a different source IP address for a while. Event ID 531, Source = Security, Category = Logon/Logoff Windows server security log is indicating numerous failed attempts of a user trying to log in.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |