Quantcast
Channel: Devolutions Blog
Viewing all 1708 articles
Browse latest View live

NEW: Remote Desktop Manager PowerShell Module

$
0
0

For years, Remote Desktop Manager has supported Windows PowerShell through the RDM CmdLet snap-in. And while this was a functional solution, we have made things even easier with the new RDM PowerShell Module.

The RDM PowerShell Module is called RemoteDesktopManager.PowerShellModule.dll, and it is located in the same folder as RDM binaries (RemoteDesktopManager.exe).

If you installed RDM in the default location, here is how to import the module:

Import-Module “${env:ProgramFiles(x86)}\Devolutions\Remote Desktop Manager\RemoteDesktopManager.PowerShellModule.dll”

Alternatively, if you launch PowerShell through RDM (Tools->PowerShell Console), or from a PowerShell session, the new RDM PowerShell Module will load automatically.

Remotedesktopmanager-Powershell

And there’s even more good news: in addition to putting all of the existing cmdlets in the new module, we’ve added new ones and enhanced the overall functionality based on feedback from our community of IT pros. Here’s a quick rundown of the new features and improvements:

More interactive and dynamic

When using PowerShell interactively, the cmdlets now dynamically create parameters and validation sets. For example, when you use the cmdlet Get-RDMSession, the parameter “Name” works as a filter and gives you the available connections by name in your current data source according to the parameter Group.

Access the Private Vault
  • Get-RDMPrivateSession to get sessions from the user Private Vault.
  • Set-RDMPrivateSession to save sessions into the user Private Vault.
Manipulate User Specific Settings
  • Get-RDMUserSpecificSettings to get user-specific settings from a session, or local and shared templates.
  • Set-RDMUserSpecificSettings to save user-specific settings into a session.
Manipulate documents sessions
  • These cmdlets are useful for moving document sessions from one data source to another they keep the embedded data document in the document session.
  • Get-RDMSessionDocument to get document sessions stored in the data source.
  • Set-RDMSessionDocument to save the document in the data source.
Local and shared Playlist management
  • New-RDMPlaylistLocal to create a new local playlist.
  • Get-RDMPlaylistLocal to get a local playlist.
  • Set-RDMPlaylistLocal to save a local playlist.
  • New-RDMPlaylistShared to create a new shared playlist.
  • Get-RDMPlaylistShared to get a shared playlist.
  • Set-RDMPlaylistShared to save a shared playlist.
Added cmdlets to simplify session configuration
  • Get-RDMSessionCredentials to retrieve the credentials ID or credentials mode.
  • Set-RDMSessionCredentials to set a credentials mode without having to know the credentials ID.
  • Rename-RDMGroup is now the best way to change the group of a session.
  • Get-RDMOpenedSession to get the embedded opened sessions in the Remote Desktop Manager application.
New parameters added to cmdlets
  • Set-RDMCurrentDataSource accepts username and password to avoid a UI prompt (SQL Server, DVLS, MySQL and MariaDB are supported).
  • Copy-RDMSession workflow is now similar to the copy from the UI, and returns the new copied session in the pipeline.
  • There are now set parameters in the cmdlets of type New, which enable you to save the object created without having to use the Set cmdlet related to it. For example, when creating a new session with New-RDMSession, using the parameter SetSession will save the session in the data source just like Set-RDMSession does.
  • Open-RDMSession now allows for the opening of a session externally or silently, which is useful for syncing sessions.

We hope that you find the new RDM PowerShell Module useful and easy to use. As always, please send us your feedback by commenting below, posting in our forum, or sending me an email.


How to Use Remote Desktop Manager Offline Mode

$
0
0

Remote Desktop Manager offline mode lets you connect to a local copy of your data source when your database is unavailable. But before you can do this, you need to grant access on three levels:

  • User level (settings can be changed in the User permissions)
  • System level (settings can be changed in the Data Source settings)
  • Machine level (settings can be changed in the Data Source configuration)
RemoteDesktopManager_OfflineMode3

If you wonder what offline mode you are currently using in your data source, go in File – My Data Source Information. Simply hover over the offline mode method to see each level setting.

There are also three permission levels associated with the offline mode:

  • Disabled – this prevents an offline cache from being used
  • Read-only – this allows the user to browse and launch sessions
  • Read/Write – this allows the user to add, update and delete sessions
RemoteDesktopManager - OfflineMode1

Simply grant access and set the permissions and you’re all set! You’ll be accessing Remote Desktop Manager from the patio, your favorite café, or anywhere else you need to be.

Surprise Extra!

Although this is a mini refresher, there’s actually something NEW we want you to know about.

As you know, internet access when you’re on the road can sometimes be sporadic. And with Remote Desktop Manager, you may not love the fact that you have to go through various warning pop-ups to access your data in offline mode.

Well guess what? Now you can bypass them! Simply go to: File – Options – General – Application start – Startup online state, and then toggle Automatically go offline.

RemoteDesktopManager - OfflineMode2

Once you do this, Remote Desktop Manager will automatically open in offline mode until you change it back. It’s a great option when you know you’ll be on the road, and your internet access will be unavailable.

If you want to learn more, we’ve put together a helpful tutorial video covering Remote Desktop Manager offline mode – you’ll find it here. Enjoy!

As always, please let us know your thoughts by using the comment feature of the blog. You can also visit our forums to get help and submit feature requests, you can find them here.

What Are the Best IT Certifications to Get in 2016 and Beyond?

$
0
0

Certification is one of the key ways that knowledgeable IT professionals distinguish themselves in the field, especially when it comes to applying for a job. Many hiring managers and automated online application systems filter resumes based on certifications. Having the right certification at the right time can make all the difference.

In light of this, we’ve decided to dive into the world of IT certification to help you identify which certifications today’s employers find most valuable. Here’s a rundown of our findings:

Certified Ethical Hacker (CEH)

A CEH has the skills required to hunt for and exploit vulnerabilities in target systems. But instead of using their talents to serve the Dark Side, these hackers work in a lawful manner to help companies and governments stay safe. This certification is provided by the EC-Council and approaches ethical hacking from a vendor-neutral perspective. Learn more here.

Certified Information Systems Security Professional (CISSP)

The CISSP is governed by the International Information System Security Certification Consortium (ISC)². It’s a vendor-neutral certification that verifies your in-depth technical and managerial knowledge, experience, and ability to manage an overall Infosec program. This is a very in-demand certification. Once you have it, you’ll likely be able to find a job in just about any big corporation that is hiring, since most of them insist on CISSP certification. Learn more here.

Certified Information Systems Auditor (CISA)

Governed by ISACA, the CISA is a globally-recognized certification for security, audit control, and assurance professionals. Obtaining this certification highlights your experience, skills, and knowledge. It also validates your ability to assess vulnerabilities, report on compliance, and institute controls across an organization. Learn more here.

Certified Information Security Manager (CISM)

The CISM certification is also governed by ISACA, but unlike the CISA, it’s focused on management-related issues, including international security best practices, design and assessment, and so on. Many companies require that their Infosec managers and leaders are CISM certified. Learn more here.

Certified in Risk and Information Systems Control (CRISC)

Yet again, CRISC is an ISACA certification (they sure are busy over there, aren’t they?). CRISC is considered the only certification that prepares IT pros for the unique and often difficult challenges of risk management and enables them to become strategic partners to the enterprise. Learn more here.

CompTIA A+ Technician

CompTIA’s A+ certification has been around for many years. It is awarded to IT pros who demonstrate a solid understanding of fundamental hardware and software business technologies. It also verifies their ability to support complex infrastructures. Many companies require that their support staff have A+ certification. Learn more here.

Cisco Certified Network Associate (CCNA)

The CCNA is an associate-level certification provided by Cisco. There are several types of CCNA certification tracks that focus on verifying foundational competence in different areas, including security, service providers, data centers, routing/switching, and so on. Learn more here.

Cisco Certified Network Professional (CCNP)

The CCNP is similar to the CCNA, but is a more advanced level of certification that requires more experience with networking skills. The CCNP manages WANs and LANs for systems between 100-500 nodes, while CCNAs work on smaller networks. Also, CCNP certification is a specialist certification, while CCNA is foundational. Learn more here.

Cisco Certified Internetwork Expert (CCIE) Routing and Switching

The CCIE certification is the next and final step for IT professionals who want to reach the top of Cisco’s certification ladder. Only 3% of Cisco-certified professionals worldwide earn the CCIE, so it’s a pretty big deal – and very lucrative! There are a few CCIE tracks, but Routing and Switching is the most desired and valuable. Learn more here.

Citrix Certified Professional — Virtualization (CCP-V)

Citrix’s CCP-V certification has replaced the Citrix Certified Enterprise Engineer certification (CCEE). To become a CCP-V, IT pros must first obtain their Citrix Certified Associate (CCA) certification, which proves their competence in systems management. CCP-V certification validates the skills needed to install, configure and roll out common XenDesktop 7 solutions. Learn more here.

Microsoft Certified Solutions Expert (MCSE)

MSCE certification is a way for IT professionals to prove their ability to create an innovative cloud and on-premises solutions across multiple technologies. There are a variety of MSCE certification tracks. Once passed, re-certification is now required every  year. Many tech jobs require MSCE certification. Learn more here.

VMware Certified Professional 5 — Data Center Virtualization (VCP5-DCV)

And of course, how could we not include the VCP5-DCV? This certification confirms that an IT professional has the knowledge required to install, deploy, scale and manage VMware vSphere environments. Having at least six months of experience with VMware infrastructure technologies is a prerequisite as well. This certification is very in-demand by today’s employers, and salaries starting at $100,000 per year are common. Learn more here.

Your Turn

Which IT certifications have you earned, and which do you want to achieve in the future? Please share your opinions and advice with our community. And remember: if you’re an MVP, CTP or vExpert, you’re entitled to a free RDM license! Learn more about the program here.

Case Study: Right! Systems, Inc.

$
0
0

“Remote Desktop Manager is an actively developed and supported tool that supports the modern protocols and features of virtually everything a system admin or engineer needs. The number of features is just fantastic!”  – Preston Gallwas, Solutions Architect – Right! Systems, Inc.

Client Snapshot

Since 1993, Right! Systems, Inc. has provided business-driven, multi-vendor IT solutions to clients worldwide. Drawing on deep industry expertise and a portfolio of interrelated consulting, application, and infrastructure services, their solutions help organizations gain control of their enterprise-wide technology, increase productivity and end-user satisfaction, refocus talent and energies on their core business, and decrease total cost of ownership. The company’s engineering service department has a team of approximately 30 IT professionals who manage around 1500 servers, machines and devices.

Right! Systems’ Challenges

As part of their work, Right! Systems’ service engineers routinely visit the company’s large roster of clients. Prior to using Remote Desktop Manager, it was difficult and inefficient for engineers to store, organize, share, and access the organization’s huge­– and constantly growing – pool of credentials.

The company attempted to solve this challenge with other solutions (e.g. MSTSC, RDCMan, RoyalTS), but ran into additional obstacles and problems, including:

  • It was frustrating for engineers to save a variety of remote gateway desktop servers.
  • When logging into a remote server, engineers routinely had to deal with wildly distorted/huge icons, because they were connecting via a UHD resolution with DPI scaling on.
  • They could not support different RD Gateways within the same document.
  • It was time-consuming and inefficient to access credential information on-site with a client.
Right! Systems’ Solution: Remote Desktop Manager

Since adding Remote Desktop Manager to its environment, Right! Systems’ engineering team has solved all of these challenges and now enjoys several benefits, including the ability to:

  • Save all connections and credentials, while efficiently organizing them by folder for easy on-demand retrieval from any location.
  • Organize resources into a manageable pane/document while on-site with a client.
  • Specify different RD Gateway settings on a per-folder level, which prevents having to configure dozens of individual connections.
  • Use RDM’s built-in VPN capacity to specify a connection to a VPN client and connect to a specific server.
  • Avoid distorted visuals as DPI scaling happens automatically and smoothly (i.e. no re-login required).
  • Save time and avoid errors by using RDM’s web browser auto-fill feature
Feedback from Preston Gallwas, Solutions Architect – Virtualization:

“With a current project we’re engaged in, thanks to RDM, we’ve seen a huge boost in productivity as there is a large number of servers and credentials to manage. It would be difficult – or at the very least extremely annoying – to do this manually. Remote Desktop Manager has made it a breeze!”

Remote Desktop Manager User Interface

$
0
0

Since you’re an IT pro, you know that user interface isn’t a small detail – it’s a big deal, and it makes or breaks a solution. That’s why we’re obsessive around here about optimizing the RDM user interface and making it work for you instead of against you. We want to make it as functional and versatile for you as possible without clogging or cluttering up your workspace. It’s a constant balancing act!

One of the ways we strike this balance is by offering you 3 user interface options: Ribbon, Menu and Classic UI.

Ribbon – This is my personal favorite, and also the most popular among our users. Most RDM features are accessible, which makes it efficient and user friendly. We’ll take a closer look at Ribbon in a moment.

Menu – This UI was part of a previous generation, but we wanted to keep it around because we know many of you like it. It has a standard menu for choosing various commands/features.

Classic UI – This version offers limited customization, but the trade-off is that it needs minimal system resources to operate.

A Closer Look at Ribbon

Let’s take a closer look at Ribbon’s main screen. As you can see from the screenshot, each section/pane offers different features:

RemoteDesktopManager - UI1

Top Pane – Offers a quick access toolbar with most RDM features

Navigation Pane – Holds your tree view with all of your entries

Content area – Holds various dashboards for managing RDM. One dashboard is active at a time, and this pane also contains your session tabs when opened in embedded mode.

Footer – Contains the different panes of your selected entry, like the description, sub connection, attachments, etc.

Status bar – Contains your search/filter area, RDM version label and notifications.

It’s not hard to see why Ribbon is the most popular user interface – everything is nearby.

RemoteDesktopManager_UI2

Customizing Your UI

We’ve also made it easy for you to customize your RDM user interface. For example, let’s say that you launch your sessions in embedded mode, and therefore want your screen to show your dashboard only. No problem! Simply hide your Footer, Navigation Pane and Top Pane, and voila, you have much more room.  Here’s what it would look like:

Don’t worry: if you get a little bit lost because you’ve hidden features/options and don’t know how to get them back, simply go to Window – Reset Layout to reset the layout to its original view.

RemoteDesktopManager - UI3

On top of that, our panels can be reorganized and moved as you prefer.  When you start dragging you will see a few acceptable drop destinations appear.  This isn’t a topic easily covered by a blog post, so we have a video to display that feature in depth.  You can find it : HERE.

As always, please let us know your thoughts by using the comment feature of the blog. You can also visit our forums to get help and submit feature requests, you can find them here.

September Poll Results: Who’s the Greatest IT Pro You’ve Ever Met?

$
0
0

As you may recall, last month we asked you to tell us about the greatest IT pro you’ve ever met. It could be your boss, your mentor, an expert that you met at a conference…anyone who you’ve personally connected with at least once.

We received plenty of great responses on our blog and our social media platforms. Here’s one story that really stood out to us – and to many other people, as we’ll explain in a moment. This is from long-time RDM user Frank McCourry:

“20 years ago, I was new in the IT business and was assigned the duties of installing a WAN using Adtran CSU/DSU and Cisco 1600 series routers. I had to configure IP and knew nothing about it.

My boss knew nothing other than this was the equipment needed and basically told me to sink or swim. I didn’t have time to take a class on TCP/IP and had no idea what to do, so I called the NOC and explained that I was having difficulty configuring these devices.

Instead of brushing me off, the engineer on the other end gave me a lesson in IP routing and very patiently taught me what I needed to know, all the while helping me complete the job in the process. Not only did I keep my job and impress my boss, but I got a valuable lesson in patience and persistence from a colleague I will never know.

That engineer is my IT hero!

Frank’s story is a perfect example of the positive difference that IT pros make each and every day. No, they don’t always (or often!) get the credit they deserve. But the DO make an impact – and as we can see in Frank’s case, it can be lasting and even life-changing. Way to go Frank!

Also, we mentioned above that Frank’s story resonated with many IT pros. That’s because after participating in the poll, Frank was inspired to re-post his story on Reddit, and it has since generated a whopping 200 comments! Check it out here. It’s really great stuff and will make your day!

And the Winners Are…

Each month, we randomly choose two poll participants who each get a $25 Amazon gift certificate. This month’s winners are: Jim Zhou and Mark Kraska. Congratulations! Please email me at jdupont@devolutions.net to claim your prize.

Stay Tuned

The October poll is just around the corner, and we think you’re really going to like this one. It has to do with the kind of “unique” support requests you’ve received over the years…stay tuned!

October Poll: What’s the Worst or Dumbest – Support Ticket You’ve Ever Received? 

$
0
0

October is here, which means it’s time to wake up Billy Joe because, alas, September has ended (that’s for all you Green Day fans!).

Of course, October means many other things. In our part of the world, it’s the dawn of cold and flu season, and a lot of people seem surgically attached to their Pumpkin Spiced Lattes. And who isn’t looking forward to slipping on a humiliating Halloween costume and getting free candy? Good times!

But we haven’t even mentioned the best thing about October: it’s time for the October poll! You’re going to really like this one…

Here we go: as an IT professional, we know that you take the “professional” part very seriously. But you’re also a human being, and there are times when you get a support ticket that makes you roll your eyes and think: WHAT THE **BLEEP** IS GOING ON HERE?!?

And so this month, we’d love for you to share your worst – or just plain dumbest – support ticket story.

Your story could be scary and terrifying, like being unable to recover data after a disaster. Or it could be wacky, like the guy who threw a tantrum because his mouse wasn’t working – and then threw an even BIGGER tantrum when you asked him if it was plugged in (which, of course, it wasn’t!).

Express Yourself & Win

Sharing is good for the soul, and so getting some bad or crazy support ticket stories off your chest can be fun. Maybe even therapeutic. And you can bet that the other IT pros in our community will nod their heads and empathize with your situation. Hey, we’ve all been there…many times!

Share & Win

Simply by commenting below, you’ll be automatically entered to WIN one of two $25 Amazon gift certificates. So you’ll not only feel better, but you could wind up $25 richer. What’s not to love about this month’s poll? Thanks and good luck!

How to configure SSH Tunnel in Remote Desktop Manager

$
0
0

We often receive questions about our SSH Tunnel entry. What does it do exactly? When do you need it? What does it eat in winter? How do you actually set it up? Let’s take a deeper look at it!

SSH tunneling is used to create a secure connection between a local and a remote computer, by going through another device that relays a specific service. Some people call this device a Jump or server. It’s basically an encrypted tunnel created through an SSH protocol connection. The SSH Tunnel can be used to establish a form of a virtual private network (VPN), and since the connection is encrypted, it can be useful for transferring unencrypted traffic over a network through an encrypted channel.

For example, we can use an SSH Tunnel to securely transfer files between a FTP server and a client even though the FTP protocol itself is not encrypted. It could also be useful when connecting a client through an SSH server protected by a firewall. SSH tunnels also provide a means to bypass firewalls that prohibit or filter certain internet services.

There are three ways to create an SSH tunnel:

Local port forwarding: The connections from the SSH client are forwarded via the SSH server, then to a destination server. Local port forwarding lets you connect from your local computer to another server. For example, you could use the local port forwarding to bypass a company firewall to connect to your client. It is the most used type of port forwarding.

Remote port forwarding: The connections from the SSH server are forwarded via the SSH client, then to a destination server. Remote port forwarding lets you connect from the remote SSH server to another server. For example, you could connect from your SSH server to a computer on your company’s intranet. It is a less common type of port forwarding.

Dynamic port forwarding: The connections from various programs are forwarded via the SSH client, then via the SSH server, and finally to several destination servers. Each program that uses the proxy server needs to be configured specifically, and reconfigured when you stop using the proxy server. For example, dynamic port forwarding lets you bypass a company firewall that blocks web access altogether. It is rarely used as it is very time consuming to set up.

Settings

We will showcase the local port forwarding mode as it is the most commonly used by far.

To create an SSH tunnel, a given port of your local machine needs to be forwarded to a port on a remote machine, which will be the other end of the tunnel. This is the job of the SSH Server.  Once the SSH tunnel has been established, the user simply connects to the local end of the tunnel in order to access the remote host transparently.

This might sound more complicated than it is — so let’s look at a concrete example of how to set up an SSH Tunnel. Let’s say you’re the IT technician at your office and need to connect to a client through an SSH server to perform work using RDP, but (there is always a but) it is protected by a company firewall. You need to get through the firewall in order to perform your work. The solution is to create an SSH Tunnel in Remote Desktop Manager to carry the RDP communication.

SSH Tunnel Diagram

SShTunnel-Diagram

Start by creating an SSH Tunnel entry in Remote Desktop Manager.

RemoteDesktopManager - SSHTunnel6

In the SSH Server Settings, enter the following information:

Host: Enter your SSH Server host or IP address (please refer to (3) in the SSH Tunnel diagram).
Port: Enter your SSH Server port (please refer to (4) in the SSH Tunnel diagram).
Username: Enter your SSH Server username to connect.
Password: Enter your SSH Server password to connect.

In the Outgoing Tunnel Settings, enter the following information:

Local address: 127.0.0.1 (please refer to (1) in the SSH Tunnel diagram).
Local port: Use any unused port that you prefer, but RFC6335 states that the Private Port range is from 49152 to 65535 (please refer to (2) in the SSH Tunnel diagram).
Remote host: Enter the host or IP address of your remote host (please refer to (5) in the SSH Tunnel diagram).
Remote port: Specify the appropriate port for the chosen protocol. For instance, RDP’s default port is 3389 (please refer to (6) in the SSH Tunnel diagram).

RemoteDesktopManager - SSHTunnel2

Then create your remote session (in this example we will use an RDP session).

In your RDP session, enter the following information:

Computer: Enter your Local Address (please refer to (1) in the SSH Tunnel diagram) – 127.0.0.1
Port: Enter your Local Port (please refer to (2) in the SSH Tunnel diagram) – 49152
Username: Enter the username to connect to your Remote Host.
Password: Enter the password to connect to your Remote Host.

In the VPN tab of your session, in Open, select Always connect; in Type, select Session.

RemoteDesktopManager - SSHTunnel3
RemoteDesktopManager - SSHTunnel5

And finally, in the Settings tab of your VPN, simply select your newly created SSH Port entry.

You have now configured your session with the following rule: for each connection that comes on interface 127.0.0.1 and port 49152, forward that connection to the SSH server and request the server to forward that connection to your Remote Host.

You can now launch your RDP session and your SSH Tunnel will automatically open, establish the connection, and then launch and open your RDP session.

RemoteDesktopManager - SSHTunnel4

One little side note: if you experience an error when launching your RDP session, adjust the After Execute Wait delay in the VPN/SSH/Gateway tab, which is located in the advanced properties of the session. As some servers are slower than others, the delay may be too short, in which case the session would get launched before the SSH server has had time to properly connect.

We truly hope that we’ve helped demystify the SSH Tunnel for you and, in doing so, made your day a little bit better!

As always, please let us know your thoughts by using the comment feature of the blog. You can also visit our forums to get help and submit feature requests, you can find them here.


8 Really Useful Websites for IT Pros

$
0
0

There are now over 1 billion sites on the web – which would be amazing, except so many of them leave a lot to be desired. In fact, a lot of them are downright scary (and no, we’re not just talking about the ones with 800 cat-themed videos). The good news is that in this bottomless mine of websites, there are some really useful gems. Here are my top 8:

Scr.im

This nice and simple website converts your email address into a robot-proof link, so that it won’t get scrubbed by spammers – and your inbox won’t get overloaded with crap. Thanks Scr.im!

FaxZero

OK, so faxes aren’t as popular as they once were. But they still exist, and some industries (e.g. legal, medical) rely on them because they’ve been deemed safer than scanning or emailing documents. But guess what? You don’t have a fax machine! And you aren’t about to buy one either. So what happens when you actually need to send a fax? No problem: FaxZero has you covered. It’s an online service that lets you send up to 5 faxes per day (what are you, a pharmacist or something?), and it’s FREE.

Basecamp

Basecamp is a cool online project management platform that is ideal for relatively simple projects. It’s cloud-based, which is great if you have remote teams or use multiple devices in your work.

Instructables

I recently came across this one and it’s great! Instructables is a community of wonderful geeks who share their creations and discuss how they put them together, helping you learn from their expertise. You’ll find raspberry pi projects, and plenty more.

GoToMeeting

Citrix’s GoToMeeting simply and easily lets you connect with anyone via the web (VoIP). It’s great for video conferences, demos, remote interviews and more. We use it here at Devolutions and it’s getting the job done!

MxToolbox

MxToolbox is a multi-platform service that offers network diagnostic and lookup tools, as well as related email security services. One aspect of the website that is particularly useful is the blacklists page, which lets you test a mail server IP address against over 100 DNS-based email blacklists. I use this tool a lot!

WeTransfer

Have you ever wanted to send a file to a colleague, only to have it repeatedly bounce back because it was too big? Well, WeTransfer solves that. It features some really cool desktop and mobile apps as well.

Network-Tools.com

As you can guess from its name, Network-Tools.com offers DNS tools to test your network, such as ping, lookup, trace, spam blacklist check, etc. Try it and you’ll soon see how useful it can be. It’s similar to MxToolbox and well worth checking out.

Your Turn

Now it’s your turn: please share your list of the most useful websites in your professional life, and tell us why you love them so much. Your insights and experiences can benefit IT pros around the world.

All’s well that ends well — The Tale of the 1-Star Review

$
0
0

While getting recommendations, advice, and warnings from peers has always been part of the “buyer’s journey”, the web has made consumer feedback about 10 million times more influential. I mean, no matter what you want to buy — from industrial equipment to pizza – there’s a good chance that someone out there is ranting or raving about it.

Here at Devolutions, we read, analyze, and discuss all of the feedback we get – both positive and negative (and sometimes, the same feedback contains both). Listening to our users is built into our DNA.

Now, if you’re a regular blog visitor, you may recall that we feature Case Studies to put the spotlight on users who are saying positive things about our products and support. However, what you probably haven’t seen is a spotlight on negative feedback — until now! And that brings us to the tale of the 1-star review…

The 1-Star Review

Recently, a user had a bad experience with Remote Desktop Manager for Android . This user encountered a bug that prevented the username/password prompt dialog from displaying when he tried connecting an RDP session without credentials.

Understandably, this user felt frustrated and did what a lot of us would do in a similar situation: he left us a 1-star review. Obviously, we were disappointed, but we certainly respected his right to share his experience. Besides, it’s not like he expected something that our app couldn’t deliver; the bug he found was a real problem!

The story, though, doesn’t end there, as this user did something great by going beyond the 1-star review: he went to the “bug report” section of our forum and detailed the problem, which helped us take care of the issue.

The Google Play Store is great when it comes to rating an application, but it doesn’t let us communicate with you. That’s why we created a forum so you can directly reach us.

What Happened Next…

As you might expect, our RDM for Android development team was ALL OVER this the moment it was posted. They launched into action, found the bug, and fixed it within a day. They also contacted the user, apologized for the problem, and let him know that it was fixed and a patch was available.

And Still, There’s More…

Frankly, the fact that this user took the time to help us make RDM for Android a better product was impressive enough. But then he went above and beyond the call of duty by returning to Google Play and changing his rating from 1 star to 5 stars. What a guy! After all, thanks to him, the team was able to fix the problem in one day.

The Moral to This Tale…

We invite you all to let us know when you encounter something that isn’t right or if you have a suggestion for future versions/updates. We take your feedback very seriously and we try to ensure that nothing ever falls through the cracks.

Plus, you need to keep in mind that if you don’t contact us through our forum, but only on Google Play. We can’t communicate with you and neither help you.

And remember: if you don’t know who to contact or where to post in our forum, you can always drop me a line at jdupont@devolutions.net. I will take personal ownership of your communication and make sure that it is routed to the correct person on our team.

Cheers!

Movin’ on Up: Remote Desktop Manager Updated for .NET 4.6

$
0
0

Here at Devolutions, we’re constantly working to improve our products and help you control the IT chaos in your world. And that’s why we’ve recently updated our .NET framework from 4.0 to 4.6. As noted by Microsoft:

“With the .NET Framework 4.6, you’ll enjoy better performance with the new 64-bit “RyuJIT” JIT and high DPI support for WPF and Windows Forms. ASP.NET provides HTTP/2 support when running on Windows 10 and has more async task-returning APIs. There are also major updates in Visual Studio 2015 for .NET developers, many of which are built on top of the new Roslyn compiler framework. The .NET languages — C# 6, F# 4, VB 14 — have been updated, too.”

Plus, since .NET 4.6 is the base framework of Windows 10, you can now use Remote Desktop Manager on your Windows 10 PC without downgrading your framework to 4.0.

It’s Time to Let Go…

If you’re a Windows XP fan, then we’re sorry to say that the party is really and truly over. Microsoft stopped supporting the OS back in 2014, and it was left off the .NET 4.5 roster as well. So yes, old flames sometimes linger for years. But it really is time to move on. On the other hand, XP users still can download and use previous versions of RDM.

Sysadminotaur #51 : Detox

Meet Our New Technical Writer Mohammed Al-Zubady

$
0
0

Today, I’m delighted to introduce you to Mohammed Al-Zubady, our outstanding new Technical Writer. I recently had the chance to chat with Mohammed to learn more about his background, goals, hobbies and more.

Can you tell me a bit about your professional background?

My professional background has always focused on writing, whether from a technical or academic basis. I have a Bachelors and Masters in Political Science, and I have been able to transition to technical writing through my extensive experience in writing, researching, and editing at the academic level. Prior to starting at Devolutions, I worked as a Technical Writer in both the private and public sectors. I worked as a Documentations Assistant at the United Nations Environment Programme (UNEP) in Montreal in 2013, and as a Technical Writer for a building automations company from 2015-2016. As of this moment, I have accumulated over 4 years of professional experience as a Technical Writer, and over 3 years of teaching experience at the university level at Simon Fraser University.

What would you say is your biggest professional achievement so far?

I have many achievements that I am proud of in my professional life. But if I had to pinpoint one, I would say being able to successfully transition from political science, and the discipline of humanities, over to technical writing – the reason being that technical writing is becoming a necessity in the world of IT, software, and engineering. Being able to transition from humanities to technical writing and documentations has allowed me to broaden my knowledge base in IT, software, computer programming, and engineering. I am very fortunate to have made the switch over to technical writing.

What was it about Devolutions that made you want to work here?

My career path has taken me to companies of varying demographics, expertise levels, and staff sizes. The one constant throughout my employment history has been working for companies with a long-standing established history. Companies of this nature tend to view their employees as numbers, replaceable cogs in the machine. What stood out to me about Devolutions was the “closeness” exhibited between employees, regardless of experience, or status. I have always sought to work for a company that works for the overall development of the employees. The location of the HQ, the incredible transparency of the team and company friendliness was a major incentive in deciding to work for Devolutions. I know that my skills and background are appreciated at Devolutions. I’m not treated as another face that can be replaced at the drop of a hat. Finally, knowing that your input matters, and your presence is appreciated is something that is a lost art in most companies. That is not the case at Devolutions!

What would you say are your top three strengths at work?
  1. Being able to work in a team of all shapes and sizes.
  2. Attention to detail, and razor-sharp focus.
  3. Eagerness to learn and progress in my duties.
What tasks do you carry out in your job, and what are some of the tools that you use?

My tasks involve improving the existing documentation, as well creating new documentation for all Devolutions products. As my role continues to expand at Devolutions, I will be responsible for creating technical blogs that will offer a brief insight into features changes, as well as other changes to Devolutions’ products. Since Devolutions is continuously growing, there is always a need for creating new documentation. This is achieved through various software tools such as Microsoft Office, Help and Manual tools, Adobe Creative Cloud, and the maintenance of images through my preferred tool, Snagit.

What are your impressions of working here?

As a Technical Writer, it’s rare when I am at a loss for words. But working at Devolutions has left me speechless. The atmosphere, friendliness, and sense of togetherness are incomparable. Furthermore, the working conditions are second to none. The generosity of the management towards their employees cannot be overstated. I have to pinch myself at times to make sure I am not dreaming! Being able to work in an environment that ensures the demands of the employees are well taken care of is an approach I wish other companies would try to replicate.

What goals would you like to achieve at Devolutions?

My goal is to remain at Devolutions for many years to come. I hope to grow within the company, and help the company reach new levels of success and prosperity. My personal goals would be to grow as a Technical Writer in the hopes of becoming a Team Leader of the Documentations team. I believe that my background as a Technical Writer and diverse work experience are assets to Devolutions, so I hope we move forward in a symbiotic manner.

On a personal note, what are some of your hobbies and interests?

Outside of work, I am an avid fitness fanatic. I love weightlifting and running. Training is not only beneficial to my physical health, but more importantly to my mental health. Most writers are introverts by nature, and I fall into that category. I like to partake in activities where I can focus on my own health and happiness – weightlifting, running, reading scholarly literature about Middle Eastern and global politics, and playing video games when time permits.

Please share a few words with our community of IT pros:

It is remarkable to see what IT professionals have been able to create. Simplifying the lives of companies and individuals undoubtedly takes lots of sweat and tears (not sure about the blood part) from IT pros, which allows us simpletons to perform better in our daily lives. Keep up the good work!

Alternative to Microsoft Remote Desktop Connection Manager (RDCMan): Devolutions Remote Desktop Manager

$
0
0

If you use RDCMan and are happy with it, that’s great. As the old saying goes, if it ain’t broke, don’t fix it. But if you use RDCMan “just because you’ve been using it for years”, then you owe it to yourself to look into some alternatives and decide if it is still the best tool for you. Indeed, there are many options out there – most notably…Remote Desktop Manager.

Now, I know what you’re thinking, because I’d be thinking the same thing: even though RDM is superior to RDCMan, the latter is free. And free is good! But guess what? Even if you compare the free version of RDM (which is aptly called “RDM Free”) with RDCMan, we think you’ll clearly see that our solution offers more features to satisfy your specifics needs, including:

1. Cross-platform

Remote Desktop Manager is cross-compatible with multiple platforms, including Windows, Mac, Android, and iOS. You can use Remote Desktop Manager on any device to control as many sessions as you need, while taking control of many other platforms. As such, you can continue to juggle your work between various devices. And if there’s a weekend emergency, no problem. RDM will help you deal with it safely and securely from your smartphone or tablet at home.

2. Manage more than RDP connection

With RDCMan, you can manage RDP connections – and that’s all. With RDM, on the other hand, you can create and manage as many sessions and connections as you need, while also taking advantage of over 50 integrated tools and technologies, such as:

  • SSH
  • Microsoft Remote Desktop (RDP, RemoteFX)
  • Apple Remote Desktop
  • VPN
  • VNC
  • LogMeIn
  • TeamViewer
  • Chrome Remote Desktop

Plus, if your preferred tool(s) isn’t integrated, simply submit a request and there’s a very good chance we’re either in the process of developing it, or it’s on the “to do” list for the near future.

3. Keep your credentials secure

With RDCMan, you have to manually enter credential data in order to control a machine or device remotely. This is very time consuming and can lead to errors. RDM integrates our enterprise-grade password manager features. As such, once you create a session, you’ll never have to enter the credential data again! Everything is safe and secure.

4. Constantly upgraded and supported

RDCMan is “as is” software and is not supported by Microsoft. There’s no way to contact Microsoft to notify its developers of bugs and submit features requests. The last time Microsoft updated RDCMan was back in November 2014. But here at Devolutions, we update RDM several times a year. Check out the extremely active Change History for proof of our commitment to constantly improving and enhancing RDM. Our users can always reach us through our forum to make some new features requests or ask RDM-related questions.

Why Not Give RDM a Try?

Even if you deeply love RDCMan, there’s no risk in giving RDM a try and putting it to the test. If you’re a new user, you can enjoy RDM Free anytime you want, forever. You can continue to use RDM Free for as long as you wish, enjoying all of the advantages noted above. Plus, if you want to give it a try, you can quickly and easily import all your sessions in a matter of minutes.

If you have any questions or feedback on RDM, please feel free to email me at jdupont@devolutions.net. If I can’t quickly answer your inquiry, I’ll make sure it gets to the right team here at Devolutions.

Most Popular 2-Factor Authentication (2FA) Compared

$
0
0
Google Authenticator vs Authy vs Yubico vs Duo

Do you, by any chance, use the same password for more than one website? Do you download software straight from the Internet? Or click on sketchy links in email messages? By doing any of these typical actions, you risk having your password stolen or being hacked. 2FA will prevent this from happening by adding an extra layer of security to your account.

There are 3 well-known factors used for authentication: something you know (a password or passphrase), something you have (your mobile phone or a token), and something you are (your fingerprint). 2FA means the system is using two of these options to authenticate you.

2FA can offer important benefits to enterprises as well as individual users, although the technology can seem complicated and the tools themselves vary. Choosing the right software to fit your needs is a hefty task, so we did some digging around for you and took a closer look at the most popular ones: Google Authenticator, Authy, Yubico and Duo.

Some of the features that we look for in a great 2FA application are mobile support, multiple token support, reporting, complexity workflow and FIDO support.

Google
Google Authenticator is a 2FA mobile application that uses the Time-based One-time Password Algorithm (TOTP) and HMAC-based One-time Password Algorithm (HOTP), for authenticating users.
  • TOTP algorithm: Google Authenticator uses the TOTP algorithm to provide new code every 60 seconds, making it a secure option to generate codes for 2FA.
  • Works without Internet access: One of the most appealing features of Google Authenticator is that it doesn’t require any sort of internet or cellular connectivity. Since Google Authenticator uses TOTP, the same code will be generated on your mobile device and on the Google side without internet. The matching code gives you access to your account.
  • Holds multiple accounts in one place: Most websites allow you to have more than one account, but won’t allow you to use the same mobile number with multiple accounts. To receive your 2FA code, you then have to give different mobile numbers for each. The Google Authenticator application allows you to have codes for all your accounts in one place.
  • Easy to use: Google Authenticator is easy to use and has a simple interface. The application also works in airplane mode and will work on older version of Android. It is less than 2MB in size, so it works easily on all devices, even those with less RAM and storage.
  • User Interface: Google Authenticator would benefit from a smoother interface. The new version adds a lot of white space and wasted space, including a lot of scrolling to get where you want to be.
  • Too few accounts on the screen: If you only have 4 accounts, then it will work well, but if you have 14 accounts, only 4 of them will occupy the entire screen, making it impossible to view all of your accounts in a glance.

Google Authenticator is mostly for single users, but it could also serve industry standards. It is best suited for users who need an easy app to protect their password on some of the most popular websites.

The application is completely free.

Authy - 2 Factor Authentication
Authy makes it easy for anyone to use their iPhone, Android or desktop for 2FA with all their online accounts. Choose between 3 different combinations of authentication options: Authy SoftToken, Authy OneCode and Authy OneTouch.
  • Mobile and desktop application: If you want to install 2FA on your desktop, Authy is the way to go. The application is supported whether you’re using iOS, Android, BlackBerry, Linux, Mac OS or Windows — you could even install the application on your Apple Watch.
  • Security token directly on your desktop: Most people use their smartphone as their second factor, which means that you have to copy the security code onto your computer when prompted. Authy makes it easier by inserting the security token directly on your desktop.
  • Sync and backup in the Cloud: Authy allows you to sync and backup your accounts on the Cloud. This saves time, since you no longer have to manually add your accounts to each device and browser.
  • Remove other authorized devices: If your phone is stolen or lost, you will be able to remove the lost phone from the devices’ list on your desktop application, thereby preventing it from syncing with Authy’s servers. Keep in mind, however, that if your phone has been stolen, the thief could still use Authy to generate tokens for any accounts you’ve already added to it.
  • Master password not mandatory: Authy hasn’t made it mandatory to enter a master password to protect its desktop edition; without protection, this could be a safety concern. Entering a master password upon installation should be mandatory.
  • Initial investment of time: Getting Authy up and running takes some time, as you have to set up each of your accounts individually, authorizing the Authy application to generate 2FA tokens for each one.

Authy has made it quite easy and manageable to have 2FA for single users, developers and businesses.

Authy has different pricing depending on which plan – Authentication, Phone verification or Phone intelligence — you choose. They have a free plan for less than 100 authentications per month or a pay-per-use plan. You will have to contact them for an Enterprise license price, which will vary depending on volume.

Yubico - 2 Factor Authentication
Yubico offers YubiKey, which is a small hardware device that features 2FA with the simple touch of a button.
  • Works independently: Hardware keys like YubiKey have the great advantage of not relying on phone or network coverage, or anything else; no matter what, they just do their job.
  • One key to secure unlimited applications: There is no limit to the number of applications you can access from a single YubiKey. Just buy it once and use it as much as you want!
  • Excellent support for users: Yubico offers support via email or online support tickets. They also offer plenty of online support documents, which are available to download, as well as some open source software for developers.
  • Ease of use: YubiKey is incredibly easy to use. With a simple touch, it protects access to your computers, networks and online services. It’s robust, small and never needs a battery.
  • Some sites are not really supported by YubiKey: Yubico lists WordPress as being supported but the plugin for WordPress is not developed by Yubico. The plugin was coded by an individual and hasn’t been updated in over two years, so it comes up with a security warning in the WordPress Plugin Directory. Yubico also lists Dashlane as being supported, but you will need a Premium or Business account for it to work. If you only have a free Dashlane account, YubiKey will not be supported.
  • Easy to lose: The YubiKey is pretty small and some people find it hard not to lose one of these tiny gadgets.

The YubiKey really is for anyone and everyone. It’s built strong enough for large companies, while remaining simple enough for single users. Any organization considering 2FA should take a very close look at Yubico. It would even be the perfect solution for developers since Yubico offers open source software, documentation and tools.

The standard YubiKey USB authentication key starts at $40. Yubico also offers a FIDO U2F Security Key for $18.

DUO - 2 Factor Authentication
Duo enables users to secure their logins and transactions by self-enrolling and authenticating through their smartphones, the Duo mobile app, a landline, or even offline.
  • iCloud backup of all your information: When enabling iCloud Backup, your Duo Mobile account information will be automatically backed up on your phone and can then be restored on the same device.
  • Duo Push: With Duo Push, you won’t even have to copy numbers anymore. It is an out-of-band authentication method that prevents remote attackers from stealing your password. The app or website sends an authorization request directly to the application on your smartphone, which displays two buttons: Approve and Deny. From there, you simply tap “Approve” on the push notification sent to your phone.
  • Integrates with almost everything: Duo 2FA can be integrated into websites, VPNs and Cloud Services. It can work with iPhones, Androids, Windows phones, Blackberries and personal computers.
  • Endpoint security: For organization, the Duo Platform Edition gives you advanced analytics to help you look into your users’ devices and security health. This edition will even flag any out-of-date device software for you, giving you rapid insight into possible security risks.
  • Countdown clock: Duo could improve by integrating a countdown into their application. This would prevent users from being in the middle of typing the number in, only for it to suddenly change.
  • Configuration sync between devices: At the moment, there is no way to synchronize your configuration between devices. You have to configure each device separately if working with more than one.

Duo’s customers can easily range from single users to small businesses to large corporations. It is easy to use for the single user but still meets organizational security requirements and has a wide range of options (like Endpoint Security and group management) for larger organizations.

The Personal license (2FA for up to 10 users) is completely free; the Business license is $1/user/month; the Enterprise license is $3/user/month; and the Platform license will cost you $6/user/month.

Conclusion

2FA can render hacker attacks much less threatening since accessing passwords is not enough anymore to access your information; and it is pretty unlikely that the attacker would also have the physical device associated with the user account. More layers of authentication makes a system more secure.

Any of these four apps would do a great job in providing that extra layer of protection. All of them support mobile tokens, have different levels of flexible authentication methods, and some will even provide you with advanced analytics. They differ, however, when it comes to pricing, packaging offers, and ability to comprehend and act on the diverse product reports. Surely, these four should be in the starting lineup for any individual or enterprise in the market for a great 2FA.

We concentrated this blog more towards user oriented 2FA, however there are other beasts out there that are more enterprise driven like AuthAnvil or SafeNet only to mention a few. Devolutions Server actually incorporates those solutions such as: AuthAnvil, SafeNet, Azure MFA and Radius. Maybe one day will do a comparison with those ones…maybe…

Let’s not forget that 2FA comes in all sizes and flavors and you need to know as much about multifactor authentication as possible before choosing the right one for you.

Here is a table for a quick overview of some advanced options supported by the different 2 Factor Authentication applications.

2FactorIntegrationCompareTable-Devolutions


Intel AMT: Now on Remote Desktop Manager for Mac and iOS!

$
0
0

As you know, Remote Desktop Manager features built-in support for Intel Active Management Technology (AMT), which is a hardware and firmware technology for remote out-of-band PC management. For example, from within RDM, you can reboot, power up/down, open KVM, etc.

However, for several years, AMT support has only been available with RDM for Windows – which has frustrated some of our users. But today, all of that has changed, as we’re thrilled to announce that built-in support for AMT is now available on RDM for Mac and iOS too! 

We’ve Got Your Back!

At Devolutions, we’re always listening. If you need something and we can make it happen, we’ll do it. Simple as that. And if we can’t, we’ll still put it on the wish list because, hey, anything’s possible. Tell us what you have in mind by sending me an email or posting in the feature request section of our forum.

Enjoy!

Case Study: EM-Soft sistemi d.o.o.

$
0
0

“Remote Desktop Manager is our central tool for managing any type of server. It is secure, reliable, and supported by a team that is always adding new features and functions. We work with many customers at the same time, and have a huge volume of connections and credentials to manage. With Remote Desktop Manager, we can keep everything safe and in a single place. That is very important for us.”

-Elvis Gustin, Owner and System Engineer at EM-Soft Sistemi d.o.o.

Client Snapshot: EM-Soft sistemi d.o.o.

Headquartered in Slovenia, EM-Soft Sistemi is a certified Microsoft Solutions Provider that delivers a range of specialized services to clients throughout Europe. These services include: cloud email solutions, hosting, technical support, network security, backup and disaster recovery, contractor management, web development, and IT infrastructure installation and integration. The company’s clients range from mid-sized organizations with 100+ employees to large enterprises with 100,000+ employees, and projects can involve the management of 150 to over 500 servers and devices.

EM-Soft Sistemi’s Challenges

Prior to discovering Remote Desktop Manager, EM-Soft Sistemi’s engineers routinely struggled with several frustrating challenges:

  • They had to store credential data locally on a specific computer; if that computer was replaced or there was a problem accessing the information, they had to re-populate the credentials.
  • They could not access credential information outside the office.
  • All devices had to be used through the same application.
  • They had to use a confusing mix of tools for different devices and connection types.

EM-Soft Sistemi tried to resolve these challenges with various tools (e.g. Microsoft products, mRemote, ASG-Remote Desktop, etc.), but they were ultimately unsuccessful. According to Elvis Gustin, Owner and System Engineer at EM-Soft Sistemi d.o.o., “Each of the tools we tried wouldn’t allow us to connect different users with their own unique credentials to the same database. ASG-Remote Desktop wasn’t bad, but we found that the features and functions were limited for what we needed.”

EM-Soft Sistemi’s Solution: Remote Desktop Manager

The EM-Soft Sistemi team discovered Remote Desktop Manager and quickly identified it as the solution they had been looking for. Since implementing it, they have overcome their challenges and are leveraging additional benefits, including the ability to:

  • Securely store credentials for different users in a centralized repository.
  • Access credential and machine information via the cloud from any desktop, laptop or mobile device.
  • Control all switches, firewalls and services from a single console.
  • Set permissions for connecting to services and devices.
  • Use a single application for all types of connections.
  • Work with different requirements and protocols in the same window, e.g. PowerShell, Hyper-V, RDP, SSH, ILO, etc.
  • Integrate with other systems in their environment, e.g. ISL Light, Mikrotik, etc.
Elvis Gustin, on his company’s decision to choose Remote Desktop Manager:

“Remote Desktop Manager is ideal for increasing productivity and security. It has become our central tool, and because it’s cloud-based, the information we need is always available. This has shortened our response time and made our customers happier. In fact, Remote Desktop Manager is the first tool we use to contact our customers.”

New SQL Server Custom Authentication Mode

$
0
0

Custom (Devolutions) is a new authentication mode that uses a single account to access the database for users of this type.  User accounts will be created for your staff to use Remote Desktop Manager (RDM), but to be entirely managed by RDM. SQL Logins are not created for these user accounts, therefore accessing the database directly (with tools such as Microsoft Excel or others) will no longer be possible.

To ensure that the password of the account used for the database access is not revealed, the administrator will be required to distribute a Data source Definition file (.rdd) which contains the information beforehand.

Let’s cover the entire process:

When creating a user, select Custom (Devolutions) as the Authentication type.

RDM-Custom-authentication
RDM-Authentication-Devolutions

To ensure the highest level of security, most of your users should be using that model.  There should be a limited number of user accounts of the Database (SQL Server) Authentication Type.

Next is the Data source definition. Using File – Data sources.  You can see that Custom login is selected and that Ted’s credentials have been entered.  Please be aware that this is the screen appearing on the end user’s screen.  The credentials used to connect to the database are displayed in the Settings form.

RDM-loginmode
RDM-loginmode-settings

In this screen, one can view the Username used to connect to the database. Note that the Password is not displayed and can not be revealed with any button or selection. Credentials can be overwritten by a user, but users of that category would not have access to that information.

As an administrator, there are two choices for providing the data source definition to their users, either by filling in everything but their own credentials, or filling in all the required information.  The final decision will be dependent on the number of users.  In either scenario, the button with the green arrow is needed to create the .rdd file.

RDM-datasource

For higher security, the account used to connect to the database should not be an account used to manage the entire SQL Server instance.  Furthermore, using a distinct account  to avoid confusing RDM’s activity with other users is recommended if you do consult the SQL Server logs to monitor logins.

Sysadminotaur #52 : DDoOOOoS (Halloween Special)

October’s Poll Results: What’s Your Craziest or Dumbest IT Support Story?

$
0
0

As you may remember, last month we asked you to share your craziest – or just plain dumbest – IT support story.

Before getting to the action, I just want to say this: IT pros are PATIENT people! Wow. Some of the stuff that you guys put up with deserves a medal.

Oh well, even if your users don’t always appreciate your expertise and hard work, rest assured that your fellow IT pros – and everyone here at Devolutions – know how important you are. Without you, the IT infrastructure would have no structure. People would be screaming in their cubicles, panic would erupt, and total anarchy would ensue. You’re the glue that holds the world of work together. Cool, huh?

And now for the responses…

As we hoped, there were many brilliant responses to the poll question here on our blog, and on our other social media platforms. Plus, the question was re-post on Reddit, and it has since received nearly 150 responses! You really should check it out – trust me, you’ll be laughing and crying at the same time.

Overall, the responses were so eye-opening and hilarious that it’s impossible to pick the best ones. However, there was one particular response that caught everyone’s attention, including our CEO David. Here’s what Mark Kraska shared:

“So, yeah…there will be skeptics out there regarding this tale, however, some of you will go…”Yeah, me too”. My IT org is way understaffed (like all of you) and we prioritize on business impact unless it’s a ticket from the CFO! (Mahogany row exemptions they call it).

We only have a 20MB connection at HQ for 350 people, so we ask that only production related tasks are allowed for internet use. The ticket says: “The network is too slow! Fix it NOW! My Rolling Stones music video is cutting in and out…”

As IT manager, I take the ticket and walk into her office. She says “Fix it before I come back” and walks out of her office. I calmly take her iPhone, turn on Network sharing, switch her laptop network connection to her phone and leave. Two weeks later she tells me the network has been great since I fixed it. (And before you ask…yes we pay for her phone plan…)”

Way to go Mark! You really came through!

DRUM ROLL! And the winners are…

As you know, each month we randomly select two poll participants to receive a $25 Amazon gift certificate. The winners for the September poll are…drum roll, please… Jamie Booth and Todd Klindt! Congratulations. I’ll make sure to contact you on Discuss. Also, you can email me at jdupont@devolutions.net and I’ll send the gift certificates your way!

Thanks again for participating! I’ll be posting the November Poll tomorrow, so stay tuned!

Viewing all 1708 articles
Browse latest View live