Support Blog

ps command execute

Microsoft Exchange: Automating PowerShell Commands

Enable any user to run PowerShell commands using a drop-down menu from the PowerScripts Library. Automate Administrative Tasks with PowerScripts PowerShell is the primary scripting language that Microsoft utilizes to allow administrators to make changes to their environment. Running PowerShell scripts against Exchange environments is also a great way to monitor availability and gather performance metrics. As most Exchange admins Read More
global teams

Wrangling Notes Client Security

When I started working with Lotus Notes in 1994, there was only the Lotus Notes client in the client server model. Majority of the workstations were located in the same geographical location on the same LAN as the server and remote users were also Lotus Notes clients that dialed in to the server via a modem. For the most part Read More

wow_logo

Domino Database Security & Database Design Element Security

Securing Notes Databases Diving through the layers of securing Domino, we are now at database security. For any Notes database be it a mail file or an application the front door for getting in the database is the database’s Access Control List. Hence, it is imperative that you develop ACL standards and enforce them to control not only data access Read More

wow_logo

Notes IDs – The Backbone of the Domino Security Model

The Domino and Notes security model is rooted in its ID files, formidable keys that are unique to each Domino installation. The loss or compromise of any Notes ID results in a recovery process, especially time consuming if that ID happens to be an Organization or Organizational Unit certificate. Properly storing and maintaining your Notes certifier, user and server IDs Read More

peaking blinds

The Stuff Outside of IBM Domino That Keeps Me Up at Night

The security of the Domino system is influenced by the physical location of the Domino server, Operating System configuration and network access points. It is important to understand how these can impact Domino. Physical Security Common security sense says that the servers of any application should be stored in a data center that has some type of controlled access. While Read More

ibmsecurity

Domino Server Security – There are 10 Things You Need to Know

In the past I have rolled my eyes at top 10 lists. Then, about a year ago I became enthralled with the “Hamilton” soundtrack. Composer Lin Manual Miranda conveys the concept of duels in “Ten Duel Commandments”, listing the 10 rules of engagement. Towards the end of the musical, the 10 list is reprised in The “World Was Wide Enough,” Read More

Petya-Ransomware

Petya Cyberattacks: How to Avoid and Defeat Ransomware

Petya Cyberattacks: How to Avoid and Defeat Ransomware Don’t let your guard down just yet. While the threat of last month’s WannaCry ransomware has just about disappeared, a new threat is already on the rise. The cyberattack is believed to have hit its first targets in Ukraine. Going after the central bank, main airport as well as the Chernobyl nuclear Read More

wow_logo

IBM Connections: 20 New Use Cases

IBM Connections: 20 New Use Cases Internal Communications 1) Engage Employees: Turn the typical one-way communication into a real dialog by listening to and responding to employees. 2) Branding & Design: Customize the user interface by adding personalized layouts or company watermarks to maintain the corporate identity. 3) Business Units: Easily create and manage content across the various communities for Read More

Alan soccnx

We’re Headed to Chicago for Social Connections 11

The RPR Wyatt team will be attending Social Connections 11 next week, June 1-2, and we are excited to announce our own IBM Champion, Alan Forbes, will be conducting his own session on Docker. Alan’s session will take place on day one of the conference in the Redis Room at 1:30pm. If you can’t make it to Alan’s session you Read More