Wednesday, September 25, 2013

This Week's Reading - 20130923

10 common-sense rules for end users and those who support them - TechRepublic

BBC News - The man who makes £100,000 watches 

Make Messages on iOS 7 show full names - Mac OS X Hints - Good to find, I thought it was annoying how the short names were shown

10 common-sense rules for end users and those who support them - TechRepublic


10 common-sense rules for end users and those who support them

help_desk_tools_082713.jpg
Whether it's opening unsafe files, experimenting with settings, or otherwise wreaking havoc on their desktops, end users are their own worst enemy on a PC.

It doesn't have to be that way. With a little education, those same end users can stop the destructive behavior they unleash on their machines. Before that education can happen, they have to know exactly what they're doing wrong. After much thought, I have devised a list of ten common sense "rules" end users should follow in order to keep support staff from spending all of their time cleaning up avoidable problems.

1. Use strong passwords

It never fails to amaze me how many times I see password as a password. Some users will opt for their first name as a password, or their birth date. Either way, it's bad practice. When possible set up password policies that can be enforced on the server level. If you don't have the ability to control this on a software level, make sure your end users know all the tips and tricks for creating strong passwords that they can remember.

2. Selectively reboot Windows

There are times when it's best to just reboot windows. If a printer magically stopped working, or if a network connection to a user PC is down, there are certain instances when a reboot could prevent a support call. A reboot is your friend. That reboot must, of course, always be done properly to avoid further issues (save and close open applications). A reboot won't always solve the problems at hand, but in some cases it will, and your end user will be happily working again in moments.

3. Don't play "Whack a mole" with your keyboard

Here's the thing, we all get frustrated. Some times there's an issue we just can't fix. When that happens, it's easy to get a head of steam and take it out on the keyboard (or the desk even). Don't. Next thing you know, you're spending your budget replacing keyboards, mice...or worse. If you get into one of these situations, step away from the computer and give yourself a moment to calm down. Go back to the job when you can look at it without blood surging through the veins in your eyes.

4. Don't leave applications open

There are certain applications (such as QuickBook) that can suffer numerous issues when left open for long periods of time. I like to tell end users when they leave at the end of the day to have all applications closed. Part of the reason for this is due to network connections. When some PCs go into hibernate, their network connections are shut off. That being the case, a network-dependent application will have issues once the network connection is disabled. Other, more poorly crafted applications, can wind up with memory leaks, should they remain open for extended periods of time. It is imperative that you inform your end users how best to manage their applications. The last thing you need is a department of end users coming to you claiming they've lost an entire days work in QuickBooks because they left it open over night.

5. When in doubt, don't

If an end user is staring at a PC with an issue, and they have the slightest bit of doubt about taking an action – they shouldn't take that action. Although not common, taking the wrong action could have catastrophic consequences. Rather than create additional problems, users should always call IT when they don't know what to do. By default, they may not know this. Make sure users feel comfortable contacting support when they need it.

6. Regularly scan for viruses / malware

When you're deploying machines, you'll be adding antivirus and anti-malware. What good are those solutions if you're not setting them up to do either real-time scanning or regular, nightly, scanning? You can't rely (nor should you) on the end user to handle this. It's not their job to protect their machines, it's yours. You will probably be handed anti-virus/malware solutions by those that make the purchasing decisions. Make sure you know how to set it up to run automatically and make the necessary exclusions so that end users can do their jobs properly. Do not skimp on this job or you will wind up with more headaches than ibuprofen can handle.

7. Never insult end users

It's really easy to rush to your office and complain about how horrible the end users are in your company. Most IT support pros don't understand that it is equally as easy to insult those same users, right to their faces, without knowing you have. Sure, those end users aren't keyboard ninjas like you; but can you do their job with the same competency? We all have our skills, don't let one of yours be insulting fellow employee or clients.

8. You don't make the rules, you enforce them

Unless you have a title like COO, most likely you are just the messenger when it comes to computer usage policies for end users. It is not your job to make the rules or to argue about them. Your job is to make sure the policies are being enforced. Your job is also to deploy the hardware to the specifications of those that make the rules.

9. Liquids and electricity do not mix

It never fails to astound me how many people do not comprehend the fact that electricity and water are not good bedfellows. Water spilled on laptops is a recipe for disaster. Coffee and wine? Even worse. End users need to learn to keep their drinks either in secure containers or away from their devices. Period. And if you think it's important to keep those liquids from desktops? Consider the consequences of spilling your morning coffee over a rack of blade servers. This is a rule you not only must enforce, you have to follow. Set a good example – give all hardware a wide berth when you have a cup of liquid in your hands.

10. Computers do not have an infinite lifespan

How often do you hear, "But this computer is only five years old!"? End users need to fully understand that computers have a limited lifespan and that moving parts and that hard drives, wear out. Once they comprehend that idea, they understand the importance of, say, backups and keeping their data carefully filed away.

End users aren't all created equally. Each of them has different needs and skill levels, when it comes to the technology they use. But if everyone follows these rules, both users and those that support them will be happier.




Tuesday, September 24, 2013

How to use the new Android remote lock option

Geek Tech How to use the new Android remote lock option

Earlier in September, an update to the Google Settings app for Android tipped off that a remote device lock and password reset feature was on its way to the Android Device Manager. On Monday, the service finally went live for most users through the ADM Website.

Previously, the ADM would only let you ring a misplaced device or do a remote wipe if you lost your handset or it fell into the wrong hands. The addition of remote password reset and screen lock brings ADM ever closer to the features Apple offers with Find My iPhone.

Overall, ADM's remote lock feature worked very well and incredibly quickly. Once you enter a new lock device password online, the data is immediately sent to your Android device and will override any current passcodes on your smartphone or tablet.

If your handset's home screen is visible, the display shuts down. Once you turn the screen back on, your device is locked and will require the new password to open up again.

To use the new features, you have to make sure your device is running Android 2.2 or later and authorize remote lock and wipe on your device. If you haven't done this yet, open the Google Settings app, tap on Android Device Manager at the bottom of the screen, and then tap the check box next to "Allow remote lock and factory reset."

(Click to enlarge.)

With that set, you simply need to navigate to the Android Device Manager website to manage your lost phone.

ADM first rolled out with remote alert and wipe features in early August filling in a gap long occupied by several third-party solutions such as Lookout Security and Antivirus and Total Defense Mobile Security. Popular third-party custom Android ROM CyanogenMod is also working on its own ADM-like solution.

[via Android Police]




http://www.techhive.com/article/2049308/how-to-use-the-new-android-remote-lock-option.html#tk.rss_all

Sent with Reeder



Brief message sent from a mobile device

Be wary of the dubious 'iMessage chat' Android app

Geek Tech Be wary of the dubious 'iMessage chat' Android app

A new app in the Google Play Store claims to bring Apple's iMessage service to Android devices, but users should keep their distance from this dubious software.

The app, simply dubbed iMessage Chat, is free to download and claims to have "no hidden costs" and no advertisements. It's supposed to allow Android users to communicate with iOS and Mac devices using Apple's free iMessage service, but it is operating without Apple's permission.

According to Adam Bell, the app does seem to work, though The Verge reports that Android-to-Apple communication isn't functioning properly.

Still, there are a few good reasons to stay away from this iMessage imitator. First, it asks for your Apple ID, which is attached to your personal and payment information. And as Jay Freeman (a.k.a. 'saurik' of Cydia fame) notes, all of the app data gets processed through the developer's server in China before connecting to Apple. This apparently prevents Apple from blocking the app, but it also raises security concerns about what happens to your data and login details.

Steve Troughton-Smith also points out that the app has the ability to download and install additional software in the background. Add the fact that the developer hasn't created any other apps, and you have every reason to be suspicious of this Android version of iMessage.

Besides, you can always rely on alternative apps to replicate iMessage's features without the security risks. Messaging apps such as WhatsAppViber, and Facebook Messenger let you communicate across many types of devices without counting against your SMS limit. And if you're looking to read and send regular text messages from another computer or tablet, you can use an app like MightyText. Unless the developer can somehow eliminate the security issues and earn users' trust, iMessage for Android isn't worth trying.




http://www.techhive.com/article/2049310/be-wary-of-the-dubious-imessage-chat-android-app.html#tk.rss_all

Sent with Reeder



Brief message sent from a mobile device

Monday, September 23, 2013

Make iOS 7 less nausea-inducing

Macworld Make iOS 7 less nausea-inducing

iOS 7 has many snazzy effects and cool new animations, but it's not for everyone: Some users have reported feeling dizzy from the operating system's motion effects, while others (my father included) are having issues reading the system's default text. But you don't have to deal with feeling ill every time you look at your iPhone—there's another way. Here's how to de-animate and re-boldify iOS 7.

Reduce motion in iOS 7

If the dynamic wallpaper movement on iOS 7 has you feeling seasick, don't panic: There's no need to throw your iPhone overboard. You can disable this animation and iOS 7's other more drastic shifts by going to Settings > General > Accessibility > Reduce Motion.

After you flick this switch, your home screen wallpaper should once again be as still as it was in iOS 6.

Make the text larger and bolder

Having trouble reading text in your apps? There are two solutions hidden away in Settings > General > Accessibility. The first, Larger Type, hooks into iOS 7's Text Kit framework and lets you set a predefined text size for apps to use; you can make that text even bigger by flipping the Larger Dynamic Type toggle. Currently, Larger Type only works for apps that support it—this includes any built-in app on your device, but your third-party programs may not yet have implemented this feature.

TO BOLDLY GO Turn on the Bold Text switch to embolden fonts in iOS 7 (left).

If it's not large text you seek but thicker text, iOS offers a Bold Text option within the Accessibility screen. Enabling it does require rebooting your iOS device, but after you do so, your device's default font is bolder all around.

Increase Control Center and Notification Center's contrast

Thanks to iOS 7's new layered view, Siri, Control Center, and Notification Center appear to float above your current home screen or app when you open them. Sometimes, however, that contrast is a little rough, making it hard to see what's on that top view.

DARKER TIMES Turn on the Increase Contrast switch to flatten the layers below Siri, Notification Center, or Control Center (left).

The Increase Contrast switch, found under Settings > General > Accessibility, removes the subtler blur in favor of a straight transparency gradient.

Make sure a switch is on or off

If you have trouble with color, the On/Off Labels switch in Settings > General > Accessibility enables shapes under iOS 7's white-and-green switches so that you can tell when one is enabled or disabled. (The circle indicates a switch is disabled, while the vertical line indicates it's enabled.)

SHAPE SWITCH Enable the On/Off Labels toggle to add shapes to your switches.




http://www.macworld.com/article/2049249/make-ios-7-less-nausea-inducing.html#tk.rss_all

Sent with Reeder



Brief message sent from a handheld device.

Friday, September 20, 2013

7 unexpected features in iOS 7

Cnet 7 unexpected features in iOS 7

iOS 7 (Credit: Screenshot by Jason Parker/CNET)

My review of Apple's iOS 7 went up Wednesday morning, but since then I've been writing posts about what I think are the 7 best and 7 worst things about the new mobile OS.

Here is the third and final part of this series that includes unexpected or hidden features in iOS 7.

There are certainly a ton of things that people are finding as they use iOS 7, so this is just a list of things that caught my attention over the past couple of days. If you have other hidden gems, please let me know in the comments.

Also, check back in the coming weeks as I explore iOS 7 on iPhone and iPad, or if you have any questions, hit me up on Twitter at jparkerCNET.

iOS 7

It's not a complete change, but it does give your iPhone a new feel when you change the background.

(Credit: Screenshot by Jason Parker/CNET)

Changing your "theme"
Okay, you can't actually change the theme of the new design, but it's surprising how much you can change the feel of your iOS 7 device just by changing the background. What happens is, the background changes the look of the lock screen, the dial pad when making a call, and the passcode screen by letting the background colors show through. Try a few different backgrounds to see what I mean. Another related trick for those who find the new icons too bright, is to choose the darkest still background in the settings. I found it brings the colors down a notch.

Daily quick view in Calendar
When I wrote my review for iOS 7, I was thoroughly let down when I thought I found out the daily overview was removed from the app. Fortunately, I found out later that the daily list to view your appointments and meetings at a glance was indeed still there; it's just that it's kind of hidden away.

Now, to bring up the days events at a glance, you need to hit the search magnifying glass at the top of the screen. It's not exactly intuitive, but I'm relieved it's still there.

Hiding Newstand
The Newstand is useful for finding magazines and other reading materials, and you can set up subscriptions so you get new issues such as the Economist every week. But in previous versions of iOS, people who were not interested in reading magazines on their iPhone couldn't put Apple's Newstand app in a folder to save homescreen space. The concept behind it was that Newstand already was a folder of items itself and you couldn't put a folder into another folder. CNET's Jason Cipriani even wrote a How-to late last year with a work-around just to get rid of Newstand.

iOS 7

You can now use three fingers to quit three apps at a time by swiping upwards.

(Credit: Screenshot by Jason Parker/CNET)

Fortunately, in iOS 7, you no longer need to deal with work-arounds. The Newstand finally can be placed into a folder. It's even useful for those who use Newstand all the time because you can drop it into a more general news folder to have a central location for all your news sources.

Quitting multiple apps
Sometimes you have to quit apps and the old method of double-tapping the home button and long-pressing the app to go into jiggle mode was kind of a tedious process. In iOS 7, you now can double tap the home screen and flick the app preview thumbnail upwards to quit. It's a bit faster, but in playing with my iPhone during the review I made another discovery.

Not only can you flick to quit an app, you also can use three fingers to quit three apps at a time with the same swiping motion. This will let you make sure apps aren't running processes in the background when you want the full power of your iOS device and it's a much faster method.

Infinite folders
In iOS 6 and earlier versions, you could only have up to 16 apps in a folder. This might be OK if you don't download a lot of apps, but if you're like me, you were forced to make folders like "Games 1" and "Games 2" if you wanted to organize your home screen.

Now, in iOS 7, you can put an infinite number of apps (or until you have no more storage space on your device) into a folder so you can truly organize your home screen. iOS 7 organizes your apps into groups of nine, and you can swipe to move on to each page. This should help limit the number of home screen pages you have to navigate and make for a more organized layout.

iOS 7

With a couple of changes to the Accessibility settings, the fonts are much easier to read.

(Credit: Screenshot by Jason Parker/CNET)

Make iOS 7 more readable
One thing I've been hearing since the update is that people with less than perfect eyesight have some trouble reading the thin fonts in the new design especially when they're in front of bright backgrounds (Calendar app, I'm looking at you). Fortunately, there's a fix.

If you have trouble reading the fonts in iOS 7, go to Settings > General > Accessibility, then touch the switch for Bold Text and also the Increase Contrast switch right below it. It will require a restart of your iPhone, but now reading should be a lot easier -- even in the Calendar App.

Using the compass as a level
The compass app is a neat tool to have on your iOS device to get your bearings when your outdoors, sailing, and any number of other activities. But a new feature of the compass app in iOS 7 will help those who do work around the house with a feature that acts as a level.

To keep your household handywork from coming out crooked, you can now swipe to the left on the compass, and you get a digital level tool. With this page open, you can set your iPhone on a table you might be making or even on its edge when hanging a picture, and you'll be able to tell if your handywork is truly level.




http://feedproxy.google.com/~r/cnet/tcoc/~3/FKp8akKRYrM/story01.htm

Sent with Reeder



Brief message sent from a handheld device.

Thursday, September 12, 2013

10 steps for a successful BYOD adoption

10 Things 10 steps for a successful BYOD adoption

Bring-your-own-device doesn't have to be a disaster for your organization. Plan ahead and create a good policy with these tips.

byod-workers-300x255.jpg

Bring Your Own Device will happen. Your company will find the benefits outweigh the possible headaches brought about by this change in the way we approach business technology. For many IT administrators, BYOD is a nightmare in the waiting. The security, the policies, the data loss and network bottlenecks – it all spells disaster.

It doesn't have to. With a little advance work, you can prepare your company for a successful BYOD adoption. Let's take a look at just how you can manage this.

1. Solidify password policy

You're going to have a lot of users using devices on your network that will also be taken nearly everywhere. You do not want weak passwords, such that they can be easily 'hacked' and give access to your company data to the wrong people. For this, you need to instate a strong password policy across the board. Also, make sure you require regular password changes. Your end users will balk at this; but, in the end, it will be worth the security gained. Those complaining end users will need to know why this new policy has been put in place.

2. Require device registration

Each and every device brought into the company will need to be registered. What you should get from that registration is: Device type, carrier (if applicable), MAC address, and user. With this information you are better armed to track down users who are abusing the new BYOD policy. With the MAC addresses of devices, you will be able to block offending users from using your network.

3. Limit supported platforms

When you open the floodgates to BYOD, you can easily wind up having to support Windows, Linux, OS X, iOS, Android, Blackberry, ChromeOS, and who knows what else. This can place a burden on your staff that is unnecessary. Instead of risking this, decide which platforms you plan on supporting and make this list known to the end users of the company. If users bring in unsupported platforms, do not allow them on the company network.

4. Educate your employees

Employees need to understand the risks involved with BYOD. They need to know how important it is to keep anti-virus and anti-malware up to date. They also need to know how best to keep data secure on their devices and that they should never use those devices on unsecured networks. Their education could easily become a class in Mobile Security 101. But better take the time in the front end, than wind up dealing with the ramifications of having an end user unwittingly open your network up to exploit.

5. Expand your infrastructure

Your end users are going to be taking up more bandwidth. This means more powerful wireless is going to be necessary. Instead of dealing with a bottleneck on the network, make sure you're using equipment that can handle the load. Do not rely on consumer grade wireless routers. You will also need to make sure you have a large enough incoming pipe to allow for the extra traffic coming in from end users working from various locations.

6. Tighten up network security

Your network will need to be locked down. Period. This means you cannot safely rely on built-in firewalls across the board. Purchase a hardware-based firewall (such as a Cisco, Sonicwall, or Fortinet) and make sure you get it up to speed quickly. You will also want to make sure all domain admin passwords are solid and that all security patches are applied to servers.

7. Create a company cloud

Instead of having remote users (using their BYOD devices) accessing your company infrastructure, you could create an isolated cloud (or even use Google Docs) in order for those users to easily (and safely) access the files they need to work on outside of the LAN. If you don't need a full-blown solution like Google Docs, purchase a business-class Dropbox or SpiderOak subscription and allow those users access to that.

8. Audit your network

You need to know what's on your network – down to every piece of hardware. Before you unleash the BYOD hounds, do a full audit on your network so you are completely aware of every device on site. This way, when new devices start popping up (and causing problems), you'll be able to better pinpoint the issue.

9. Redefine your support policy.

BYOD could cause you to spend more time supporting end-user devices than you have to spare. You need to rewrite your support policies to include end-user devices. The policy needs to specify: Which platforms you support and to what extent you support said platforms. It should state that you are not financially responsible for end-user devices, that you will only allow/support devices that follow company guidelines, and that you do not support/troubleshoot carrier-related issues... anything that protects you and your company from being abused by BYOD.

10. Define accepted applications

There are going to be a lot of applications used on your network – from social networking tools, to games, to chatting... you name it. You must define the type and titles of applications that you will support and/or allow on your company network. You cannot allow yourself to get into a position where you're having to troubleshoot why an end user's tablet isn't streaming music from Spotify.

BYOD is inevitable. Many administrators are dreading the flood of devices that will inevitably cause more work and more headaches. But if your company takes the time to prepare for BYOD, these headaches can be dramatically lessened (if not avoided all together).

Give some thought to what I have outlined and compare it to what your company already has planned for BYOD. Hopefully, with these ten ideas, your company can implement BYOD successfully and  painlessly.





http://feedproxy.google.com/~r/techrepublic/10things/~3/o2vNN_eoIlo/

Sent with Reeder



Brief message sent from a handheld device.

Thursday, September 5, 2013

How to make an app for your small business | PCWorld [feedly]

Configure Global Object Access Auditing in Windows Server [feedly]


 
 
Shared via feedly // published on Petri IT Knowledgebase // visit site
Configure Global Object Access Auditing in Windows Server

Keeping tabs on file and registry access in Windows Server has never been easier.

Auditing file access events in Windows Server isn't a subject that's likely to set you alight with excitement, especially as traditionally it has been something of a pain to configure. But in recent versions of Windows Server, the job has got easier. And that's important, because in today's world of regulatory compliance and the need to understand exactly what's going on in our environments, we need to make sure audit logs are capturing the right data. Today I'll go over how to configure Global Object Access Auditing in Windows Server.

 

Auditing File Access

Before the introduction of Global Object Access Auditing in Windows 7 and Windows Server 2008 R2, in order to audit access to a file you would need to set auditing configuration on files and folders using System Access Control Lists (SACLs) in the file system. SACLs are accessed by right-clicking a file or folder in Windows, selecting Properties from the menu and then switching to the Security tab. Auditing configuration can be changed by clicking Advanced in the Properties dialog and then switching to the Auditing tab in the Advanced Security Settings dialog.

As most administrators are aware, managing permissions on servers containing tens of thousands of files using Access Control Lists (ACLs) can become somewhat unwieldy, and configuring auditing this way is no less of a problem.

In order that audit events appear in the Event Log, you also need to enable success and/or failure auditing for Object Access, either using Group Policy or the Local Security Policy management console.

 

Global Object Audit Access

As its name suggest, Global Object Audit Access allows administrators to set file and registry auditing configuration per computer, rather than at the file system level. This makes it much easier to track the settings across servers on your network, rather than having to set and inspect SACLs at the file level.

In Windows Server 2008 R2, the Global Object Audit Access policy can be set as part of Advanced Audit Policy Configuration in Group Policy, which can found here: Computer Configuration\Policies\Security Settings\. Note that the location of the settings differ from basic auditing.

When you configure file or registry Global Object Audit Access in Windows Server 2008 R2, instead of the simple success and failure options presented for most audit settings, you'll notice there's just a Configure button that takes you to a dialog to set audit configuration in exactly the same way as from the file system.

For Global Object Audit Access to work, Object Access\Audit File System or Object Access\Audit Registry must also be enabled for success/failure auditing.

 

Expression-Based Audit Policy

Object Access and Global Object Access Auditing are expanded in Windows 8 and Windows Server 2012 (and later) to include expression-based audit policy. This allows system administrators to use complex logic to filter auditing to specific criteria. For example, I could an event to be logged when a file is successfully deleted by users in a specific department, as defined in Active Directory.

You can specify Boolean AND and OR operators, and even group together criteria to make complex expressions in the same way you would use parenthesis in a script.

Configure Global Object Access

In this example I'm going to monitor for deletions on my file servers, but restrict auditing to just users who are members of the Finance group in Active Directory (AD). I'll apply the audit configuration settings using a Group Policy Object (GPO):

  • Log on to a Windows Server 2012 file server in your domain with an account that has permission to create new GPOs.
  • Open Server Manager from the icon on the desktop Taskbar or from the Start screen.
  • Open the Group Policy Management Console (GPMC) from the Tools menu in Server Manager.
  • In the left pane of GPMC, expand your AD forest, the Domains folder and then your AD domain. Right-click the Group Policy Objects folder and select New from the menu.
  • In the New GPO dialog, give the new Group Policy Object a name, leave the Source Starter GPO field set to (none) and click OK.
  • You will see the new GPO in the right pane of GPMC. Right-click the GPO and select Edit from the menu.
  • In the Group Policy Management Editor window, expand Computer Configuration\Policies\Security Settings\Advanced Audit Policy Configuration\Audit Policies in the left pane.
  • Click Object Access in the list of audit settings.
  • In the right pane, double-click Audit File System.
  • In the Audit File System Properties dialog, check Configure the following audit events.
  • Check Success, Failure and click OK.

Configure Global Object Access Auditing: Enable Object Access file system

  • In the Group Policy Management Editor window, click Global Object Audit Access at the bottom of the list audit settings.
  • In the right pane of the editor window, double-click File system.
  • In the File system Properties dialog, check Define this policy setting on the Policy tab and click Configure.
  • In the Advanced Security Settings for Global File SACL dialog, click Add.
  • In the Auditing Entry for Global File SACL dialog, click Select a principal.
  • In the Select User, Computer, Service Account, or Group dialog, type Everyone in the box under Enter the object name to select and click OK.
  • Leave Success selected in the Type menu.
  • In the Auditing Entry for Global File SACL dialog under Permissions, click Clear all and then select only Delete.
  • At the bottom of the dialog, click Add a condition. Make sure that User is selected in the first drop-down menu.
  • In the second drop-down menu, select Department.

Note that you'll need to have properly configured and working Dynamic Access Control (DAC) in your environment to be able to use expression-based auditing. DAC can be accessed from the Active Directory Administrative Center (ADAC). If you don't have DAC configured, you can skip the steps to add a condition to the Global Object Access auditing entry. In this example, I already have Department properly configured as a claim type, with Finance set as a suggested value.

  • In the third-drop down, select Equals. In the fourth, make sure that Value is selected.
  • At the end of the new condition, select Finance from the drop-down menu.

Configure Global Object Access Auditing: auditing entry

  • Now click OK in the Auditing Entry dialog, again in the Advanced Security Settings dialog, and once more in the File systemProperties dialog.
  • Close the Group Policy Management Editor window.
  • Back in GPMC, right click your domain in the left pane and select Link an Existing GPO from the menu.
  • In the Select GPO dialog, select the GPO you just created and click OK.

Once policy has updated on the affected devices, you can delete a file, and assuming that the account used to delete the file has the Department attribute in AD set to Finance, an event will be logged. Look for event 4663 in the Event Log.

Configure Global Object Access Auditing: file delete event log

 



Brief message sent from a mobile device

Wednesday, September 4, 2013

How to detail your car and give it a makeover!

Consumer Reports How to detail your car and give it a makeover!

How to detail your car and give it a makeover!

Can a major cleaning boost the value of your car? To answer that question, we put out a call to find the dirtiest car in our company parking lot. The 2006 Ford Freestyle (above) won the prize; the outside didn't look too bad, but the inside made us gag. We had it appraised at a dealership, which valued it $2,500. Then the Freestyle—owned by a mom with two messy teens—got a $300 professional detailing. The former trash-can-on-wheels sparkled, though the pro couldn't get out all of the stains. The value of the car also didn't budge after the cleaning, according to a second appraisal we got at another dealership.

That surprised us. But dealers tell us that they can see right through a last-minute cleanup, even if it's done by a professional detailer. They say they're more concerned with a car's overall condition and how well it's been cared for over time. So regular cleaning and consistent maintenance are the key to getting top dollar. Other factors that affect price include regional supply and demand, time of year, and color.

That said, a thorough cleaning may help your car stand out if you're selling it privately. Here's how to save big and get professional results doing it yourself. Ken Saviet, a detailer in Mendham, N.J., who specializes in shining up high-end and collector cars, helped us with these tips. (Watch the videos at the bottom of this page for more on keeping your car clean.)

Clear the cup holders (above). These are probably the dirtiest spots in your car. To clean them fast, put an old sock over the bottom of a travel cup, spray it with window cleaner, and twist. Then get into the corners with a wooden barbecue skewer and pick out any remaining crud; remove it with a microfiber cloth. To make cup holders easier to clean, invest in rubber liners that you can take out and rinse. You can buy them at dealerships, car washes, and auto-parts stores for as little as $6.

Blast out crevice dirt (below). Poke around a car's nooks and crannies, and you'll probably find pens, change, keys, mud, and other odds and ends. After grabbing the big stuff with your hands, use a barbecue skewer to pick out the debris wedged between sill lips and carpeting. Then vacuum the area using the cleaner's crevice tool (the attachment that's flat at the end). Finish off the area with glass cleaner and a microfiber cloth.

 

Get into corners. You don't need special tools to clean out tight interior areas. Wood skewers and cotton swabs are great for small spots such as vents, seams, buttons, and switches. Old makeup brushes also work well in louvers and vents.

Deep-clean fabrics. Spray vacuumed carpets (and cloth seats if you have them) lightly with a foaming aerosol cleaner. After it begins to dry, use a vacuum to remove it. For an even deeper cleaning, rent a carpet extractor from a home center or grocery store.

Be gentle with plastics. Use an ammonia-free glass cleaner on plastic surfaces. (Ammonia may cause surfaces to bleach.)

Do a final vacuuming. A second go-over picks up any dirt that was dislodged during the cleaning.

Don't wash in direct sunlight. That will help prevent any possible damage if the paint gets too hot when you're washing and waxing. (Cloudy days are fine, too.) Also, start at the top and work your way down using a lamb's wool mitt, gentle soap, and water. Lower surfaces are the grimiest, and dirt can end up lodged in your mitt, causing scratches.

Grab a clay bar. After you've dried your car with a chamois cloth, gently pull a clay bar (see the next page for details) across the body panels to pull up leftover dirt. They're also great for getting windows squeaky clean.

 

Make rims sparkle (above). Your car's wheels get covered with brake dust, tar, and road grime that's very hard to remove. To make them shine, look for a wheel cleaner that's labeled as safe for all surfaces, and avoid caustic cleaners that can harm a factory wheel's finish (the warning labels alone made us dizzy!). Though dish soap is too harsh, other nonabrasive cleaning products work well enough. Scrub it in with a sponge and a soft-bristled toothbrush in tight areas, then rinse with water. Check for missed spots and go over them.

Give it a rest. Exterior cleaners, especially those for wheels and tires, stay wet for a while, and that can attract dirt when you drive. Wait until everything is dry before getting on the road.

There's no reason to splurge on cleaners. But don't cheap out either, especially on products you use on the exterior, such as soaps, waxes, washing mitts, and towels. The wrong tools can easily scratch paint surfaces.

For the exterior

Car wash liquid. Dedicated car cleaners are relatively inexpensive (about $10). Just keep away from dish soap and laundry detergent; they're too harsh for auto paint.

Car wax. Nu Finish NF-76, $8, is a liquid wax that's durable, easy to use, and a top scorer in our tests. The finish should last several months. See our car wax buying guide and Ratings.

Clay bar kit. Use a clay bar (about $20 online) between the washing and waxing stages to remove ground-in, microscopic dirt particles, which can cause scratches.

Glass cleaner. Skip the vinyl and plastic cleaner. A household glass cleaner works just fine. Just make sure you use one that's ammonia-free to avoid discoloring surfaces.

Lamb's wool mitt. This tool is a very worthwhile investment, at about $20. The fibers are gentle on the paint, and the nap is deep enough to snatch up loose dirt and sand so that they don't rub against the car.

Plastic bucket. Yes, we know you have one. but some car-wash buckets are designed with handy storage areas to keep your car-cleaning products organized after you're done.

Wheel and tire cleaner. For stock wheels, get one labeled as safe for all wheels. Eagle One A2Z (under $10) was tops in our tests. To remove pitting on chrome and metals, use an acid-free dedicated cleaner.

For the interior

Cotton swabs, barbecue skewers, and makeup brushes. They're perfect for cleaning vents, corners, and cup holders, and for getting around knobs and controls.

Leather cleaner. Be sure to use a product dedicated for leather surfaces; other cleaners can strip away the natural oils on seats and panels. most cleaners also moisturize leather and leave a sunscreen to prevent fading.

Microfiber towels. The "split" variety is extremely absorbent, with fibers that create crevices that trap water and debris.

Soft-bristled toothbrush. Use it to scrub out dirt in tight spots.

Spray-on fabric cleaner. Look for foaming cleaners for upholstery and carpeting.

 

This article appeared in the August/September 2013 issue of ShopSmart magazine.

Consumer Reports has no relationship with any advertisers or sponsors on this website. Copyright © 2007-2013 Consumers Union of U.S.

Subscribe now!
Subscribe to ConsumerReports.org for expert Ratings, buying advice and reliability on hundreds of products.
Update your feed preferences



http://simplefeed.consumerreports.org/l?s=_unknown&r=unknown&he=687474702533412532462532467777772e636f6e73756d65727265706f7274732e6f726725324663726f253246323031332532463039253246676976652d796f75722d6361722d612d6d616b656f7665722e68746d2533464558544b455925334449373252534330&i=727373696e3a687474703a2f2f7777772e636f6e73756d65727265706f7274732e6f72672f63726f2f323031332f30392f676976652d796f75722d6361722d612d6d616b656f7665722e68746d

Sent with Reeder



Brief message sent from a handheld device.