Good job i dont work in the gretna chase hotel like my mate does. That straddles the border....
4023 posts • joined 15 Jun 2009
We have a few old second gen i5 toshibas. They seem to be flimsy having a lot of flex in the cases but they are fairly bulletproof. They have lasted daily use with kids so cannot be too bad.
An SSD and a few more GB of RAM got them over the 1809 hump, they are running on 1909 at the moment and wont get 2004 rather the next update - that will decide their fate.
We have found zoom to be quite reliable. We use teams for our scheduled 'calendar' meetings and zoom for adhoc short meetings. Whilst this seems odd, we have found zoom to be easier to use than teams when the personal zoom rooms are used. Yes they have their security risks (being a known password for the room) but waiting rooms and lockdowns mitigate that.
Gotowebinar is bloody awful though. We get robotic high pitched shifted audio for half our users, zoom and teams work perfectly on the same machines.
If teams had a similar personal room with password approach then we would use teams for everything, as it is it can be quite fiddly inviting 40 people including some who you only just got emails for (so aren't in your distribution lists)
74 is starting to get pricy though. Most people will still need storage and a PSU. Possibly a case. This is starting to get into NUC territory.
Dont get me wrong, I like raspPi, our XIBO clients are rasp pi running from the USB of LG panels, but the next batch of XIBO displays are actually NUCs now.
Or perhaps the admin access is logged centrally so that ADT could contact the admins if necessary. Pretty fucking obvious if the same email turns up on many systems. Maybe the principal account holder needs to auth the additional admin manually. Perhaps the system periodically emails the principal with a list of what it has done etc.
You dont have scripts or triggers for certain accounts accessing many systems? You dont have audit logs checking multiple account logins to multiple consoles? How about access audit logs for security and admin rights?
How would you spot rogue admin accounts on your systems?
ADT is a security company failing at security. Pretty shit job.
I remember my handover week. The day i was asking about licenses started along the lines of "so where are is license documentation, you know Adobe and MS renewals? What CALS are you using?
The answer was along the lines of " CALS? What are those? We just used the same key and cloned the drives".
The firm basically had zero licensing. That was a fun first week budget meeting "sign this for licensing or give me written license budget refusal."
There are usually about 40 profiles on our machines. Depends how many people have logged on the past week. Group policies do clean old ones but we found the update was stalling on some. Looking in the panther logs pointed me in the direction of some profiles failing the update. No idea on the downvotes or vitriol, it was a fix that worked on our 300 machines.
Biting the hand that feeds IT © 1998–2020