ALI Blog

Executive and Technical Blogs

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Login
    Login Login form
Recent blog posts

Please note that in a recent update published by Novell, they have opted to lengthen Extended Support for Novell NetWare 6.5 and Novell ZENworks 7 Suite by a year, to 30 September 2013. In addition, Novell BorderManager and Novell GroupWise 8 are extending General Support, and will be supported on NetWare 6.5 for the same time period.

Product Previous Support End Date New Support End Date

  • NetWare 6.5 30 Sept 2012 (Extended Support) 30 Sept 2013 (Extended Support)
  • ZENworks 7 30 Sept 2012 (Extended Support 30 Sept 2013 (Extended Support)
  • GroupWise 8 1 May 2013 (General Support) 30 Sept 2013 (General Support)
  • BorderManager 3.9 30 Sept 2012 (General Support) 30 Sept 2013 (General Support)

For the best value, Novell encourages upgrades to the latest release of Novell Open Enterprise Server and Novell ZENworks Configuraiton Management, but is offering Extended Support on these older releases to provide more deployment time for customers who need it.

The Extended Support phase of Novell's Product Support Lifecycle offers installation and configuration technical support and critical security fixes for customers with current maintenance on the replacement products - in this case Novell Open Enterprise Server 2 and Novell ZENworks Configuration Management 11.

Free Unlimited Extended Support on ZENworks 7 Suite

Current Novell Open Enterprise Server maintenance customers already realize free, unlimited 12x5 technical support during the Extended Support phase for NetWare. Effective 1 January 2012, Novell is offering this same free, unilmited 12x5 technical support benefit on ZENworks 7 Suite for all customers with current maintenance on Novell's ZENworks Configuration Management.

Product Information

  • Novell NetWare 6.5 and Novell ZENworks 7 Suite Extended Support brings the following benefits through 30 September 2013:
  • Continue to receive installation support while you plan and execute your upgrade from NetWare 6.5 to Open Enterprise Server on Linux, and from ZENworks 7 Suite to ZENworks 11
  • Receive unlimited service requests 12 hours a day, 5 days a week from a Novell technical support engineer

Customers who are not current with maintenance may purchase Standard or Priority maintenance for licensed users and take advantage of Extended Support on ZENworks 7 Suite or NetWare 6.5 for free.

For further information

For detailed information on Novell's Support lifecycle, visit http://support.novell.com or contact Cindy DeHart, Novell & Virtualization Practice Manager at (540) 443-3392 or cindy@ali-inc.com

While this may not be a technologically focused topic, the team at ALI is excited to see that Bloomberg Business Week rated Blacksburg, VA as the number one place to raise children in the U.S!  Our employees in our Blacksburg office could not agree more, many of whom relocated to the area for the great lifestyle. With good schools, an affordable lifestyle, and the Blue Ridge Mountains in the backyard, it's more than just a great place to raise kids.  It's a great place to have a great quality of life with the benefits of the high tech ecosystem facilitated by proximity to Virginia Tech, Roanoke and many other organizations throughout the region.

Advanced Logic itself was founded because of the appeal of the area's resources.  Our founder moved to the area attracted to all the benefits, and saw it as the perfect place to raise his own children.  At the time, there were so few IT providers in the region, there was a clear need for high level IT services delivered locally instead of being brought in from Washington DC, Richmond or Charlotte.  The original team was assembled, and ALI was born.  20 years later, we are still growing. 

We're very grateful that this region has been so supportive of our business, enabling us to expand to provide services throughout the Mid-Atlantic.  This article is just validation of what we've known for years: this is a great place to live and work!

> Read the article: Blacksburg Named the Best Place in the U.S. to Raise Kids

Posted by on in Technical
2011-10-12
 
Blackberry/RIM are experiencing serious systems/infrastructure issues that have become more widespread in the last couple of days.  North America is now affected.  These problems affect all Blackberry users, even those running an in-house Blackberry Exchange Server (BES). 
 
Issues include slow or nonexistent email to devices, failed enterprise activations, and in general any operation that requires interacting with Blackberry's own systems, which would be most business-oriented operations.
 
http://www.rim.com/newsroom/service-update.shtml is the site their techs are giving out for updates to the problem.  There is no ETA at present but we will post updates as we get them. 
 
If you believe you are experiencing an issue and would like assistance, please do not hesitate to contact our Technical Assistance Desk.
 
 
 
 
Brice Stevens
Advanced Logic Industries
Technical Assistance Center (TAC)
(540) 443-3398

Posted by on in Technical

The HP Proliant G6-generation (and newer) servers have a new type of high-efficiency power supply that is sensitive to the waveform output of UPS units.  If you find your UPS is not carrying the new G6 server (it immediately shuts down upon power loss), check the specifications of the UPS unit(s).  The output must be True Sinewave.  If it is anything else (Stepped Approximation to Sinewave is the usual alternative), then the server will not run on it.

If you need help with this or any other support issue, please don't hesitate to contact me at the ALI Technical Assistance Center at (540) 443-3398.

Brice Stevens
Advanced Logic Industries
Technical Assistance Center (TAC)
tac@ali-inc.com

Posted by on in Executive

I wanted to follow up on the recent announcements made by HP. As a committed HP Partner, Advanced Logic Industries (ALI) is dedicated to helping you understand the meaning and impact of these changes to you, our valued customer.

Included among last week’s announcements was the HP board’s decision to evaluate strategic alternatives for the Personal Systems Group business. Although these may include a range of options, this was not an announcement of a shutdown of the company’s PC business.

Having now heard directly from Todd Bradley and other members of HP’s senior leadership team, I can tell you that HP remains committed – now more than ever – to driving growth of its PC business. A $42 billion business, PSG is the largest PC business in the world with #1 market share and profitability in the PC industry worldwide.

HP is not taking its foot off the pedal now and is will continue to drive leading innovation across its PC portfolio moving forward. You also can expect HP to continue the company’s strong and solid history of taking care of you, its valued customer. You should absolutely feel comfortable and confident in buying HP just as you always have, despite the confusion HP’s competitors might be stirring.

While there is uncertainty with change, I can tell you that ALI remains committed to HP and their products, and look forward to traveling on this journey with them. I also can tell you that I remain committed to you and will continue to keep an open dialogue with you as we identify the best technology solutions to help you run and manage your business. I encourage you to reach out to me with any questions.

Regards,

Parker Pearson
Advanced Logic Industries
Vice President, Marketing
(434) 386-4284

Some Lexmark printer software and/or drivers can cause problems whereby the Print Spooler service conflicts with the Server service on Windows workstations and servers.  Symptoms include very long (15 minute) waits on first starting Windows before it responds, as well as events logged in the System section of Event Viewer for "The Server service hung on starting".  The Print Spooler is attempting to start at the same time, which causes Server service to hang.
 
The solution is to make the Print Spooler service dependent on the Server service, so it will not start until after the Server service is started.
  1. Click Start, and then click Run.
  2. In the Open box, type regedt32, and then click OK.
  3. Locate and click the following registry key:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Spooler
  4. Click Add Value on the Edit menu.
  5. Type DependOnService in the Value Name box.
  6. Click REG_MULTI_SZ in the Data Type box, and then click OK.
  7. Type LanmanServer in the Data box, and then click OK.
  8. Click Exit on the Registry menu to quit Registry Editor.
  9. Restart your computer.
For steps 4 through 7: If the "DependOnService" value already exists and has an entry, you can add another by double-clicking the value and entering it on a new line.

If you need help with this or any other support issue, please don't hesitate to contact me at the ALI Technical Assistance Center at (540) 443-3398.

Brice Stevens
Advanced Logic Industries
Technical Assistance Center (TAC)
tac@ali-inc.com

Hits: 20280

Posted by on in Executive

Today, Hewlett Packard made a very unexpected announcement that it is looking to spin off its personal computer (desktop pc, notebook and tablet) business and cease shipment of their newest WebOS tablet.

Understandably, this is causing unease. While the information we have on hand is preliminary, I have spoken with our representatives with HP and I have been assured that existing HP warrantees and support agreements will not be impacted. Support and parts will continue to be available.

For those of you with planned purchases coming up that were slated for HP devices, we already have an excellent alternative to offer from Lenovo. (Formerly IBM) They offer terrific products and a great price point. Contact your ALI Account Manager and they will be happy to discuss this with you further and provide revised quotations.

While it will take time to see how the changes at HP will shake out, we expect to see no change in their server and storage lines. As your local IT support provider, part of our job is to help minimize the impact of these kinds of issues on your plans.

We are here to help. If you should have further questions, please do not hesitate to contact me or your preferred ALI representative.

Parker Pearson
Vice President
Advanced Logic Industries
parker@ali-inc.com
(434) 386-4284

Just a quick update on the Novell Open Workgroup Suite.  It is not often that I can give you product features and enhancements without cost. . . so I am pleased to pass this information on to you

Novell is consolidating all versions of NOWS into one single, enhanced version. Moving forward, NOWS customers will also be entitled to Novell Vibe OnPrem and ZENworks Endpoint Security Management in addition to their existing entitlements.

Novell Open Workgroup Suite customers will now be entitled to all the following products:

  • Novell Open Enterprise Server
  • Novell GroupWise
  • Novell Vibe OnPrem **NEW ADDITION!
  • ZENworks Configuration Management
  • ZENworks Endpoint Security Management **NEW ADDITION!
  • ZENworks Linux Management
  • SUSE Linux Enterprise Desktop
  • LibreOffice

Product Information

Novell Open Workgroup Suite is a buying program that delivers high value to customers who use two-or-more of Novell's core products. By purchasing these popular products through NOWS, customers pay less for licenses and maintenance than if they purchased the products separately.

  • Benefits include:
  • Simplified purchasing of multiple products into one part number
  • Simplified software asset management
  • Lower license and maintenance cost to customers than buying the products independently

What do you need to do as a current customer?

If you are a current customer of NOWS or NOWS with Vibe OnPrem then your new entitlements will show up automatically in Novell Customer Care Center.

If you are not familiar with Vibe OnPrem or ZENworks Endpoint Security Management, then read about their powerful capabilities and benefits at www.novell.com or take an OnDemand training class at your convenience.

http://www.novell.com/products/vibe-onprem

http://www.novell.com/products/zenworks/endpointsecuritymanagement/

 

For further information

http:www.novell.com/products/openworkgroupsuite/

http://www.novell.com/products/zenworks/endpointsecuritymanagement/

http://www.novell.com/products/vibe-onprem/

Please feel free to call me with any questions that you may have.

Cindy DeHart
Advanced Logic Industries
Office: 540-443-3392
cindy@ali-inc.com

 

On HP workstations and laptops that use high-density (750GB-1TB) hard drives and are running Windows, older versions of the Intel Rapid Storage Technology driver can cause various problems including the inability to run Windows Update. 

The error message will state that the Windows Update service is not started, but if you check it, it is running. 

The solution is to download version 9.5.6.1001 (software package SP47845) or newer of the Intel Rapid Storage Technology driver from HP's support website.  

If you need help with this or any other support issue, please don't hesitate to contact me at the ALI Technical Assistance Center at (540) 443-3398.

Brice Stevens    
Advanced Logic Industries
Technical Assistance Center (TAC)
tac@ali-inc.com

Hits: 14080
Our TAC has recently been encountering another variation on the "fake antivirus/scanner/fixer/etc." plague of malware. 
 
This one presents itself as Windows Repair and does the usual scare tactics of saying your workstation is infected, files/registry/hard drive sectors are damaged/missing, and so forth.  This one, however, goes a step further and sets various folders--including the current user profile folder--to be Hidden.  A telltale symptom, beyond the fake Windows Repair window, is a completely blank desktop with no program, file, or folder icons of any sort.  This can make it seem as if you have lost everything.
 
Here's how you handle this: 
 
Open an Explorer or My Computer window (use the WindowsKey-E combination if needed, or type explorer.exe into the Run command in the Start Menu)
Go to the Tools menu>Folder Options, then the View tab 
Scroll down and choose the radio button to "Show hidden files and folders".  This will let you see the items that the virus set to Hidden. 
If you then right-click your user profile folder (under Documents and Settings for Windows XP, or under the Users folder for Windows Vista and 7) and choose Properties, you will see a checkbox for "Hidden" at the bottom.  Uncheck that, and choose to apply to all files and folders when it gives you that option. 
 
You may have to do this for several other folders, depending on what the virus touched, but again they should all show up once you choose to "Show hidden files and folders" as described above.
 
You'll also need to contact your IT support to update your virus protection.  If you need assistance, please do not hesitate to contact us!
 
 
 
ALI Technical Assistance Center (TAC)
(540) 443-3398

Posted by on in Technical

GroupWise 8 & 7 users should check their security patches RIGHT AWAY! 
The GroupWise Internet Agent (GWIA) has a vulnerability.

If you need assistance with resolving this GWIA issue, please do not hesitate to contact our TAC.


 

Security Vulnerability - GroupWise 8 Internet Agent TZID (VCALENDAR) Variable Parsing

This document (7007638) is provided subject to the disclaimer at the end of this document.

Environment

Novell GroupWise 8
Novell GroupWise 8 Internet Agent
 Affected versions: GroupWise 8.0x, 8.01x, 8.02, 8.02HP1
Previous versions (such as GroupWise 7.x) of GroupWise are likely also vulnerable but are no longer supported. Customers on earlier versions of GroupWise should, at a minimum, upgrade their GWIAs and associated Domains to version 8.02HP2 in order to secure their system.

Situation

The GroupWise Internet Agent (GWIA) has a vulnerability in the way that it parses the TZID variable within a received VCALENDAR message, which could potentially allow an unauthenticated remote attacker to execute arbitrary code on vulnerable installations of GWIA.  This vulnerability affects GWIA running on all supported server OS platforms (Windows, SuSE Linux, & NetWare).
 
This vulnerability was discovered and reported by Anonymous working with TippingPoint's Zero Day Initiative (http://www.zerodayinitiative.com), ZDI-CAN-967
 
Novell bug 657818, CVE-2010-4325

Resolution

To resolve this security issue, update GWIA to version 8.02 Hot Patch 2 (or later).

Bug Number

657818

Document

Document ID: 7007638
Creation Date: 01-21-2011
Modified Date: 01-28-2011
Novell Product: GroupWise

Disclaimer

The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.

Posted by on in Technical

Are you running DHCP on your OES 2 server?
Would you like to view the DHCP leases in use?
Well, now you can in OES 2 SP3!

Please contact the ALI TAC to schedule the upgrade and configure DHCP for this feature!


 


 

 

Viewing Dynamic Leases Under The DNS/DHCP Management Console From OES 2

This document (7006450) is provided subject to the disclaimer at the end of this document.

Environment

Novell DHCP Management Console
Novell DNS Management Console
Novell Open Enterprise Server 2 (OES 2) Linux Support Pack 3

Situation

Starting with OES 2 SP 3, administrators can view DHCP leases utilizing the DNS/DHCP management console; however, before doing so one of the following errors or messages may be encountered:
  • Configure the "DHCP server IP address" to view the leases
  • Configure the "omapi-key" setting of the DHCP server object to view the leases
  • Configure the following DHCP server settings to view the leases: DHCP Server IP address, omapi-key
  • ERROR: EOMAPI1
  • ERROR: DHCP server connection failed

Resolution

To address the "DHCP server IP address" portion of the message(s), do the following:

  1. Launch the DNS/DHCP management console and login to the server (NOTE:  Novell Client is no longer needed with the latest versions of the DNS/DHCP Java Management Console)
  2. Click on the 'DHCP (OES Linux) tab toward the top of the console
  3. Find the DHCP Server object at the bottom of the console and select it
  4. Toward the top-right hand side of the console select the GENERAL tab and find the section called DHCP SERVER
  5. Click the ADD button and enter the IP address of the DHCP server
    • NOTE:  If doing this step on OES 2 SP 2 the buttons may be greyed out.  This is due to the schema not being extended.  This option is officially supported on OES 2 SP 3
  6. Click on the SAVE button toward the top, left-hand side of the console (looks like a floppy disk)
To address the "omapi-key" portion of the message(s), do the following:
  1. The first step in addressing this issue is to create a TSIG key if one has not already been created.
    • NOTE:  At the time this TID (Technical Information Document) was created, the secret for the TSIG key must be divisible by four (4).  If it is not DHCP will not load.  For instance, if the key's secret is set to SECRET then DHCP will fail to load as the secret is not divisible by four; however, if SECRET12 is used instead, then DHCP will load as the secret is now divisible by four.
      1. Launch the DNS/DHCP management console and login to the server (NOTE:  Novell Client is no longer needed with the latest versions of the DNS/DHCP Java Management Console)
      2. Click on the 'DHCP (OES Linux) tab toward the top of the console
      3. Highlight the SERVICE object (assuming it has already been created) and click on the CREATE button located at the top, left-hand side of the console (looks like a 3-dimensional box)
      4. Select 'TSIG Key" and assign the KEY NAME and SECRET.  Keep in mind the note above regarding the secret to make sure the number of characters used in the secret is divisible by four
      5. After hitting CREATE on the key the key should show up under the service object that was highlighted
  2. The second step in addressing this issue is to add the omapi-key setting itself
    1. While in the DNS/DHCP management console, and with the 'DHCP (OES Linux)' tab selected, highlight the DHCP SERVER object toward the bottom of the console
    2. Select the SETTINGS tab toward the top, right-hand side of the console (next to the GENERAL tab)
      • NOTE:  At this point the administrator should see a setting for the OMAPI-PORT already configured for port 7911.  If it is not there, the click the MODIFY button, find the setting, add it and assign it a port of 7911 (which is the default)
    3. Click on MODIFY and find the OMAPI-KEY setting (likely at the bottom of the list).  A drop down menu should appear after adding it, and a list of found TSIG keys should be presented.  Select the appropriate key
      • NOTE:  If the key doesn't show up at this point, review the steps above and create the key as specified
    4. Review the settings and make sure there is an OMAPI-PORT and OMAPI-KEY setting, each assigned a valid value
    5. Click on the SAVE button toward the top, left-hand side of the console (looks like a floppy disk)

At this point it may be necessary to hit the TREE REFRESH button located at the top, left-hand side of the console.  It is found next to the SAVE button.  Once the tree refresh is complete, expand the SUBNET and then the POOL to view any current leases that may be assigned out.  If one of the following errors is encountered, it is likely due to the fact that the leases file has not yet been populated with any leases.  This error should resolve itself once there is a lease to be found in the dhcpd.leases file on the server:

  • ERROR: EOMAPI1
  • ERROR: DHCP server connection failed

NOTE: The 'omapi-port' and 'omapi-key' settings cannot be added, modified, or managed from iManager in any way at the time this TID was written.  This has been reported to Engineering.   The steps described in this TID should be completed from the DNS/DHCP Management Console.

Jeff Bowers is one of our IT professionals with a unique background: he's a Certified Ethical Hacker, MBA and an IT networking professional.  His area of expertise is in Network Assessments and Data Security.  We sat down with Jeff recently to ask him some questions about assessing data and network security.

Data security is a challenging and delicate area.  What are your credentials that have made you successful in this field?

JB:  I have field experience from a variety of previous jobs, along with some specialized certifications.  I gained a lot of experience in my roles as an IT Auditor, a Systems Analyst and as an Information Security Analyst.  I was also the Information Security Officer of a very large ($2B) financial services company. 

As for my technical skills, I have two highly sought after certifications in the information security field.  I hold the Certified Information Systems Security Professional (CISSP) designation from ISC(2).  I am also a Certified Ethical Hacker (C|EH), a certification sponsored by the EC Council. 

My background in information security includes developing the matrix used to assess the level of security on the network by utilizing standards and guidelines from ISO 27001, NIST and industry best practices.  It also includes configuring Firewalls, routers, servers, workstations, group policies to meet the stringent guidelines of various regulatory bodies as well as accepted industry standards.  My experience includes not only the configuration of network and server equipment but also the assessment of the security controls. 

Being a Certified Ethical Hacker sounds intriguing, but how do you apply those skills to clients today?

JB: My expertise as a Certified Ethical Hacker has provided the professional training and technical expertise to perform very in-depth network security assessments for a wide range of industries. 

Utilizing a multitude of tools I gather information on network topology, penetration testing, social engineering and vulnerability exploitation.  I can develop a methodology of assessing a network ranging from a complete black box assessment to a full disclosure white box assessment. 

What’s a black box assessment or a white box assessment and what’s the difference?

JB: To explain the difference, a black box assessment is done with zero input from the customer other than the name of the company; the typical goal for this type of assessment is to gain access to the internal network of the client.   The assessment in this case will end upon successful penetration of the client network. 

A white box assessment is the complete opposite.  This type of assessment involves full disclosure from the client to include access to the internal network via an onsite visit and/or a computer setup onsite to allow remote access.  This type of assessment is usually done to assess the level of security of the network with no penetration testing.   There are various levels of assessments in between the two extremes which is where most client assessments will fall.  The length of time for a black box assessment is typically much longer than a white box assessment.  The increased length of time is due to the level of information gathering that is necessary.  A fully documented summary of the findings, methodology and the steps required to better secure the network will be provided to the client upon completion of the assessment.

What is the number one issue you see unaddressed in organizations large and small when it comes to data security?

I think the number one issue unaddressed in most organizations is data integrity.  When I say data integrity, I am referring to how the organization is able to ensure that the data they rely on to run and operate their business is properly secured.  This ranges from their accounting software to proprietary formulas to the data that is used to drive the organizations business decisions.  Improperly secured data could lead to significant financial loss for any business.  Enabling proper access controls to the data can help mitigate this risk.

Do you only help really large organizations that are heavily regulated?

Organizations large and small, heavily regulated and not all have the potential for loss due to a lack of proper controls.  Proper security controls are not just a good practice for large, highly regulated organizations.  All organizations need to ensure that they have the proper security controls in place to prevent potential business ending losses due to a data leak.

Hits: 22462

Posted by on in Technical

Contributed by Brian Ogden
2011-08-30

The Verizon Droid 3 phone is not supported by Novell Data Synchronizer due to the change in the phone software.

When you setup an account on the device, the certificate setting isn't visible on the initial screen. However, "Use a secure connection" and "Verify Certificate" is automatically enabled. Since we always use a self-signed certificate, this cert is not part of the trusted authority on the device. If you use the workaround below, you can setup an account that works, then uncheck verify certificates and switch to the config of the customer Novell Data Synchronizer.

Here is a workaround:

  1. Set-up a corp-sync or Exchange Activesync account
  2. Use your google account to create a corporate sync account . The prompt for server name should be “m.google.com” and the prompt for user name is your gmail address (the entire email address, not simply the first half/user part). So, as an example:
  3. Server: m.google.com
  4. Username: username@gmail.com
  5. After the account is created, go into settings -> accounts and select the EAS account created
  6. In the first screen, un-check the option "Verify Certificate"
  7. Change the credentials to the account needed

If you find you need more assistance with this issue, please don't hesitate to contact us!


ALI Technical Assistance Center
(540) 443-3398
tac@ali-inc.com

Our TAC support desk has seen some recent instances of HP notebooks having CPU usage spikes that drive overheating because the HP Wireless Assistant service gets hung up. 

If, on an HP laptop, the WMIPrvSE.exe process is causing repeated excessive CPU usage spikes (25% or more every few minutes) and thus overheating, try disabling the HP Wireless Assistant service.

(Start menu -> Control Panel -> Administrative Tools -> Services)

Some older versions of this software have this issue, though HP indicates the latest version is fixed for this bug.

The HP Wireless Assistant's only purpose seems to be to inform the user whether the wireless is on or off. However, if you find your wireless switch on your keyboard no longer works with the HP Wireless Assistant disabled, obtain the latest version from HP's website, uninstall the old first, then install the new.

If you need more help with this issue or would like other help with your technical support issues, please don't hesitate to contact us in the Technical Assistance Center!

Brice Stevens
ALI TAC Support Lead
(540) 443-3398
support@ali-inc.com

Posted by on in Technical

Important LiveUpdate Certificate Expiration Notice

 Problem

An older Symantec root certificate, SymRoot1, will expire on April 30, 2011. With an expired certificate, older LiveUpdate clients would no longer authenticate, download, or install content such as AntiVirus definitions or product updates.

Solution

To allow customers additional time to plan migrations, Symantec has introduced a workaround that allows LiveUpdate to continue to successfully authenticate valid content from Symantec through July 4, 2012. This date may be extended if needed on a product-by-product basis.

In addition, a newer Symantec root certificate, SymRoot2, will expire on August 23, 2020. Newer Symantec products and recently patched products are compatible with SymRoot2. All customers utilizing SymRoot1-based products are recommended to upgrade to SymRoot2-based products.

What is the impact of using SymRoot1 definitions after the certificate expiration?

The product will continue to download and install new updates, such as AntiVirus definitions and product updates. You do not need to do anything to continue to receive definitions for these products after the certificate expiration, but you are encouraged to upgrade to a version that supports SymRoot2 as soon as feasible.

Will products without SymRoot2 support still be able to use Intelligent Updater or Rapid Release to update definitions?

Yes, Intelligent Updater and Rapid Release definition packages will be signed by both SymRoot1 and SymRoot2.

Which products are affected?

The following table shows which product versions support SymRoot2 in green, which product versions will continue to receive SymRoot1 definitions after the certificate expiration in orange, and which product versions require an upgrade in red.

Product

Version

Status

Action Needed

AntiVirus Corporate Edition

10.1 MR 10

SymRoot2 Support

None

AntiVirus Corporate Edition

10.x

SymRoot1 Support

Upgrade recommended

AntiVirus Corporate Edition

9.x

No definitions after 4/30/2011

Upgrade required

AntiVirus for Linux

MR 10

SymRoot2 Support

None

AntiVirus for Linux

MR 9 and earlier

SymRoot1 Support

Upgrade recommended

AntiVirus for Macintosh

10.x

SymRoot2 Support with LiveUpdate 5.1.2

Update to LiveUpdate for Macintosh 5.1.2

Brightmail Gateway

7.7 and later

SymRoot2 Support

None

Brightmail Gateway

5.x through 7.6

SymRoot1 Support

Upgrade recommended

Brightmail Message Filter

All

Does not use SymRoot

None

Client Security

3.1 MR 10

SymRoot2 Support

None

Client Security

3.x

SymRoot1 Support

Upgrade recommended

Client Security

2.x

No definitions after 4/30/2011

Upgrade required

Endpoint Protection

12.0 / 11.0

SymRoot2 Support

None

Enterprise Security Manager

10.x

SymRoot2 Support

None

Enterprise Security Manager

9.x and later

SymRoot2 Support with LiveUpdate 3.3

Update to Windows LiveUpdate 3.3

Enterprise Security Manager

6.5.x

No definitions after 4/30/2011

Upgrade required

IM Manager

8.4.1.16

SymRoot2 Support

None

IM Manager

Prior to 8.4.1.16

SymRoot1 Support

Upgrade recommended

LiveUpdate Administrator

2.x

SymRoot2 Support

None

LiveUpdate Administration Utility

1.5

SymRoot1 Support

Upgrade recommended

Mail Security for Domino

8.0.5 and later

SymRoot2 Support

None

Mail Security for Domino

8.0, 8.01, 8.02, 8.03

SymRoot1 Support

Upgrade recommended

Mail Security for Domino

7.5

SymRoot2 Support

None

Mail Security for Domino

5.x

SymRoot1 Support

Upgrade recommended

Mail Security for Domino

4.x and earlier

No definitions after 4/30/2011

Upgrade required

Mail Security for Domino MPE

3.2

SymRoot1 Support

Upgrade or Java LiveUpdate patch recommended

Mail Security for Domino MPE

3.0

No definitions after 4/30/2011

Upgrade required

Mail Security for Exchange

6.5

SymRoot2 Support

None

Mail Security for Exchange

6.0.x

SymRoot2 Support

None

Mail Security for Exchange

5.0.x

SymRoot1 Support

Update recommended

Mail Security for Exchange

4.6

SymRoot1 Support

Upgrade recommended

Mail Security for Exchange

4.5 and earlier

No definitions after 4/30/2011

Upgrade required

Mail Security for SMTP

5.x

SymRoot1 Support

Upgrade recommended

Scan Engine

5.2.8

SymRoot2 Support

None

Scan Engine

5.2.7 and earlier

SymRoot1 Support

Upgrade recommended

Security Information Manager

4.7 MP3 (release TBD)

SymRoot2 Support

None

Security Information Manager

4.7.2 and earlier

No updates after 4/30/11

Upgrade required

 My product version will not be updated. How do I upgrade?

If possible, Symantec recommends that you upgrade to a version that supports SymRoot2. SymRoot2 compatible products appear in green in the table above. You can download the latest version of your product from File Connect or from the Business Critical Services Web site.

For some products, you may need to apply patch instead of upgrading. For additional assistance, the Technical Assistance Center line is available to provide support (540) 443-3398 or contact your ALI representative for further assistance.

Issues with the recent update for Outlook 2007


On Tuesday, December 14, Microsoft released an update (KB2412171) for Microsoft Outlook 2007. Several issues have been discovered with the update and we want to alert you about problems you might encounter and what corrective steps we recommend.

This Outlook 2007 update was distributed via Microsoft Update. Many of you receive updates automatically and if you installed the update between Tuesday, December 14, and Thursday, December 16, it is likely that you are affected.

The three issues identified in the December 2010 update for Outlook 2007 are as follows:

  1. Outlook fails to connect if Secure Password Authentication (SPA) is configured for an account and the mail server does not support SPA. This is important for Google Gmail users because Gmail does not support SPA. Outlook customers using Gmail who have the SPA option turned on cannot connect to Gmail.
  2. Noticeable performance issues are experienced when switching between folders if you do not have a Microsoft Exchange Server account configured in Outlook. Switching folders might take several seconds depending on the performance of your computer. This issue only applies when you use an IMAP, POP3, or Outlook Live Connector account, such as Windows Live Hotmail, and do not have an Exchange Server account configured in the same Outlook profile. To determine if you are using an Exchange Server account, see the help article What is an Exchange account?
  3. AutoArchive cannot be configured for IMAP, POP3, or Outlook Live Connector accounts if there is no Exchange Server account configured in the same Outlook profile. If you previously configured AutoArchive, no additional items are archived.

If you are experiencing any of the listed issues with Outlook 2007, we recommend that you uninstall the December 2010 update by doing the following:

Uninstalling KB2412171 on Windows 7 or Windows Vista

  1. Click Start, and then click Control Panel.
  2. Click Programs, and then under Programs and Features, click View installed updates.
  3. Click the entry for KB2412171, and then click Uninstall.

Uninstalling KB2412171 on Windows XP

  1. Click Start, and then click Control Panel.
  2. Click Add or Remove Programs, and then make sure that the Show Updates check box is selected.
  3. Click the entry for KB2412171, and then click Remove.

If you need additional assistance, support is available from the ALI staff.  Please don't hesitate to contact me in ALI's Technical Assistance Center at 540-443-3398

Brice Stevens
Technical Support

Posted by on in Technical
For anyone experiencing a problem with Internet Explorer crashing instantly after starting, and the issue began December 15th: Take a look in Start Menu -> Control Panel -> Add/Remove Programs and uninstall Yahoo Toolbar if you have it, then try Internet Explorer again.  
 
Possibly either Yahoo pushed an update that is causing a problem on some computers, or one of the Microsoft updates of 12/14 is conflicting with the Yahoo toolbar. 
 
If this does nto help, or you need additional support, please do not hesitate to reach me in the Technical Assistance Center (TAC).
 
Brice Stevens
Technical Support
(540) 443-3398
 

Yesterday, November 22, Novell announced that it had agreed to be acquired by Attachmate Corporation. There has been quite a bit of speculation about what this means and how it will impact those of you running Novell products.

I am not sure that any of us know exactly what this merger will mean to us collectively or individually however I have been asked to share my thoughts below:

  • As a publicly traded company Novell was often in the position to make business decisions to appease the market. I do not feel that this was always in the best interest of the product line. I believe that this announcement will be a great benefit in the aspect that Novell will now be privately held and can therefore make the best business decisions for the product line and you the customer.

 

  • The purchase price was above value – some have it too low, others do creative math and lower the cost – there are a lot of factors involved. Nevertheless, they paid a price for a group of products that they felt had value. I do agree – as do you as a customer, that there is value. I feel strongly that the full intention is to build on that value to increase revenue and provide a stronger and better product than what they purchased. I think this is exciting news that lends itself to looking forward optimistically to see what the future holds for this product line.

 

  • Finally, it happens . . . . The rumors have circulated for many years . . . it is about time something happened. There were many options; this is the one they took. I for one am glad that they have made a decision and will be moving forward. I think it is exciting – infuses new ideas, energy and synergy around the product line. I am looking forward to what comes next.

I have included below a few links, which of the many I reviewed today had some of the best re-cap of the events both good and bad. I encourage you to review them as well. There was also a letter to all Novell customers – if you do not have this information please let me know and I will be happy to send it as an attachment.

http://blogs.forrester.com/christopher_voce/10-11-22-what_does_the_novell_acquisition_mean_to_you

http://www.computerworld.com/s/article/9197739/What_next_for_Novell_?taxonomyId=18&pageNumber=1

http://news.cnet.com/8301-30685_3-20023535-264.html

And finally, at ALI we see products bought and sold on a fairly regular basis. We can provide reliable guidance and advice as you navigate the many options available. If you have any further questions please do not hesitate to contact me.

I always look forward to hearing from you,

-Cindy

Cindy DeHart

Advanced Logic industries
Novell & Virtualization Practice Manager
540-443-3392
cindy@ali-inc.com

Contributed by: Cam Cole

To stay competitive, small businesses must make the most of current technology.

Problems Are:

  • It can be expensive
  • Time consuming
  • Inefficient to maintain a full-time IT department like larger companies.

A true Professional Technology Services Provider offers

  • on-demand talent
  • depth of experience
  • deep resources
  • predictable expenses

Here are the top 5 benefits you’ll see by using a Technology Services Provider:

Benefit #1: Stay Focused on Core Business Functions:

Business owners are happiest doing what they do best, running their small business. Researching solutions and fixing IT-related problems not only distracts them from their business but is extremely inefficient especially for non-IT professionals. Further it can tie up internal staff from revenue-generating functions and the business of doing business.

Benefit #2: Reduce Costs & Control IT Expenses

By utilizing a Professional Technology Services Provider a typical Small Business will spend 25% to 50% less than the cost of even one mid-level IT professional. Also by taking in consideration recruiting, training, vacation, sick days, turnover and other management issues out of the equation to see even more savings.

Due to a single focus on IT, technology services providers are able to achieve greater efficiencies and savings by consolidating purchasing power and vendor special pricing programs, providing access to deep and broad knowledge bases and by using developed best practices which means tasks are completed more efficiently than small businesses can do on their own. This means real cost savings– both in time and money.

Costs are budgeted, predictable, and controlled.

Benefit #3: Access Greater Support & Specialized Talent

Even a few minutes of systems downtime carry enormous business costs. Maximizing uptime must be a high priority. Small businesses can no longer afford issues with internet connectivity, email communications, corrupt data or systems failure - the cost of reacting to these events is just too high. Professional technology services providers offer planned, measured approaches to pro-active systems maintenance, security, backup and disaster recovery.

Small businesses cannot cost effectively achieve the scale and flexibility to properly support their technology environments. Even a very experienced and dedicated IT employee has limits to skills and avenues for help. Professional technology services providers offer access to teams of IT specialists that deliver the cross-sectional IT knowledge needed to provide both on-going and critical support for small business networks.

Benefit #4: Help Employees Innovate and Stay Productive; Attract & Retain Employees

Communication, collaboration, and knowledge sharing allows employees to innovate. These capabilities are delivered through a multitude of technologies including file servers, central databases, broadband connectivity, mobile platforms, email communications, and many others. However, true productivity and business benefit can only be realized when this complex technology is properly planned, implemented and maintained. The best practices and comprehensive experiences around planning, implementing and maintaining such systems allow technology services providers to successfully deliver these productivity improvements.

Employees want to work in an environment where their computers are up and running. Employees want to be competitive with their rivals and they want the technology tools that really help them deliver. Potential new talent will weigh your company’s technology prowess. Utilizing a professional technology services provider allows small businesses to meet these expectations and increases the ability to attract and retain employees.

Benefit #5: Get A Technology Edge Over Competitors

Don’t just level the playing field, take advantage of new technologies for a competitive advantage. Technology services providers keep up with the latest solutions through ongoing training and real-world experience. They know how to implement the latest hardware, software, and network applications available. Just as important: they know which technologies are not worth the investment.

Want to know more? Visit our information center on ALI's Managed IT Services, or contact Cam Cole at (434) 386-4274