We share what we've learned.

"The true measure of your education is not what you know, but how you share what you know with others" -Kent Nerburn

There is no substitute for experience. Though books and classes can teach you the ideas and steps to completing tasks, there is a limit to what they can cover. Every System Admin has heard"There was no way you would have known unless you've seen it before, but next time you'll know immediately"  feeling all the more wiser when the day came to once again utilize the experience gained.

If you have an interest in participating either by writing or giving suggestions including topics please contact us.


Popular Articles

Track projects with this OneNote Template

Project Management is a fundamental skill needed to excel your Information Technology career. Documentation and planning are key components that make a successful project.Microsoft Office OneNote

Microsoft Office OneNote provides a platform to keep on top of both high level and low level project data quickly and in a well organized layout. Attached is a OneNote Project Template with three page templates.Read full article...


Using Sysinternals Disk Usage to create CSV file of Folder Sizes

Windows Sysinternals Suite has a bunch of really useful tools to make any system admin's life easier. One of those tools is Disk Usage, DU.exe. One can utilize DU to get a breakdown of folders and sizes. Anyone who was trying to find out what's utilizing all their storage knows how important this utility can be. Below is how to utilize DU as well as print the findings to a CSV file.

These are the standard instructions...

Using Disk Usage (DU)

Usage: du [-c[t]] [-l <levels> | -n | -v] [-u] [-q] <directory>Read full article...


Disable Internet Explorer Toolbars with GPO

Using GPO to disable Internet Explorer toolbars is an easy way to keep systems from running endless toolbars added usually without a user’s knowledge. The method below will not prevent them from installing but will prevent them from running. This saves system resources, network bandwidth, and certainly screen space if things got out of control.

Start Group Policy Management

in windows XP; Start > Programs > Adminstrative Tools > Group Policy Management.

in Windows 7; Start (jewel) > Administrative Tools > Group Policy Management

Find and Edit

If your organization has multiple containers, find the pertinent container and right click on the GPO linked to it and select Edit.Read full article...


Using OneNote for Documentation of IT Projects and Tasks

OneNote IconKeeping track of IT using OneNote can simplify the documentation of Information Technology information. The enigma in many organizations is that the people responsible for Computer Information Systems very often don't effectively use information that will boost efficiency and sanity. A quick setup will provide a solid foundation to build on.Read full article...


Add Users to local admin and remote desktop group using GPO

This tutorial will show you how to use the GPO Restricted Groups to add IT support technicians into the local administrator group of all PC's the policy is applied to. Using Group Policy to add users to the local admin group is a safer and better practice than providing domain admin privileges to technicians that do not have the need or experience to be working beyond the workstation level.

1.Define Security Group

First you need to define a security group in AD users and computers. In this example I am creating a security group called IT_TechRead full article...


Using Drupal for an IT Support Ticketing System

Ticket DispenserIssue tracking has the potential to make or break an IT team regardless of how well they perform.  A ticketing solution must display information in such a manor to enable a user to obtain a solid grasp of the overall situation at a glance, and user/task specific details just a click away. The adaptability of Drupal makes it a stable platform to build on.Read full article...


Word Templates for Documentation of Server Downtime Impact

Server Documentation plays a critical role in both change management and business continuity by ensuring all involved are fully informed. The purpose of Impact Statements is to have critical information available without the need for time consuming research when a system has unexpectedly gone down or during planning of system downtime. These statements play a critical role in maximizing system availability and safeguarding against accidental outages because of uninformed personnel.Read full article...


Word Template for Rating Attributes

A simple Word Document for rating items/attributes on a scale of 1-5.

I used this document to get accurate feedback regarding mobile devices in the field after the feedback focused on an aspect that was independent of the information needed. Basically following how sports players are ranked in any organized league this should be the way to get a better idea on what's currently working and what could use some improvement.

Read full article...


Network File Share Request Form

Documenting and managing network file shares and mapped network drives can get out of hand. Without the proper request form and oversight your organization will end up swimming in old shares or a jumbled mess of permissions mixed with catch all shares destroying any sense of organization.

Attached is a word document template to build your network access request form on. Whether you are mapping network drives or using shares for application data you'll be able to use this document to save yourself some time.


Password Protect USB Drive or folders on drive

Security has had a huge hole opened up with large portable storage becoming so inexpensive. A user's entire work folder can be copied and taken with them on a drive costing less than their lunch. They don't always realize the actual cost of the storage is in the data and what can happen if it's lost or stolen. Passwords on storage help thwart malicious or accidental access to confidential access, though ease of access and usability are important to keep the users on the right path.Read full article...


Try2Stop.Us | Contact Us | Log In | Try2Stop.Us © 2011