Removing Windows SharePoint Services 3.0

As Sharepoint becomes mainstream, sometimes is nice to remember the little things. Recently we had a case where we had to do just that. We removed Sharepoint Services 3.0 and reinstaled it, only to notice the same info on the webpage. We did a little digging and came across an article from Microsoft pointing out […]

Group Policy Settings References for Windows Server

Microsoft policy settings for computer and user configurations included in the Administrative template files delivered with the Windows operating systems specified. You can configure these policy settings when you edit Group Policy objects (GPOs). These spreadsheets include the following categories of security policy settings: Account Policies (Password Policy, Account Lockout Policy, and Kerberos Policy), Local […]

Real Time Event Notifications

IT admins don’t want small problems to snowball into an issue that can cause severe damage to a company’s infrastructure and Active Directory. They need a robust alert mechanism which identifies any threats in REAL TIME.  Most IT organizations are unaware of the changes until something breaks. This leads to downtime, loss of productivity, and […]

CionSystems named Startup of the Day by Microsoft

CionSystems has been selected as a 2009 Microsoft Startup of the Day. The company was chosen out of an international field of startups as delivering market-leading customer solutions built on Microsoft technology.  Building affordable and secure Active Directory management applications for the Windows infrastructure has been the focus from the beginning. “We are honored and […]

Administrative Security Risks

IT personnel cannot effectively manage their infrastructure without admin-level access. But with gaining this access comes great responsibility. Most companies do not effectively allocate their resources or implement enough technology tools to prevent information security risks. Often enough the response to countless regulations is to concentrate on building controls against external and internal business users, […]

Identity and access management

Access control is often discussed as part of identity and access management (IAM). This is a market that has grown during the past few years thanks to more and more organizations wanting to satisfy compliance requirements. Better access control is needed- not just for compliance, but also to address vulnerabilities and safeguard against malicious acts. […]