Summary: In order to see the different devices (K1000/K2000) in the org drop down, the devices will need to be linked.
Steps To Resolve The Issue:
PLEASE NOTE: If using a local account (non-LDAP) or the admin account to log in, the password must be the same for the account on both the K1000/K2000 to allow this functionality. This should not be an issue if the K1000/K2000 are both using LDAP authentication. The admin account will need to have the same password even if LDAP is enabled.
1. From the K1000, navigate to Settings>Control Panel>Linking KBOX Appliance Settings>
2. Click Edit Mode.
3. Check the box next to "Enable KBOX Appliance Linking:". Check the KBOX name and make sure it is correct. Please note that the IP address of the KBOX can be used here.
4. Click Set Options.
5. Once that saves, a new field called "Linking Key (this server):" will be visible.
6. Click Edit Mode again and copy this Linking Key.
PLEASE NOTE: it will be necessary to copy the whole field including the Begin and End strings.
7. Once copied, navigate to Settings>Control Panel>Manage Linked KBOX Appliances>
8. Click Choose Action, select Add New Item.
9. Type in the remote KBOX (K2000) name. Please ensure that this is the fully qualified domain name if this is what the KBOX is named. You can also use the IP address of the K2000.
NOTE: If the KBOX is configured to use SSL, click the checkbox next to "Connect using SSL:".
10. Paste the key in to the "Linking Key" field.
11. Click Save.
This should allow an admin user to switch between the devices. Please note that if organizations are enabled, they will show up in the same drop down menu.
Just a few lines of code in a batch file will check if the batch file is executed with full administrator rights. This is great in eg. Win7 enviroments and when used with superusers who tends to forget :)
AT > NUL
IF %ERRORLEVEL% EQU 0 (
) ELSE (
ECHO Script must run as admin, exiting...
EXIT /B 1
Nicholas Arvanitis, Security Consulting Services, Dimension Data (@narvanitis) provided some interesting stories and examples about how personal public information can be used to gain access to sensitive business information. The premise was why attack a company which is so well protected when attackers can instead go after employees who are sharing lots of personal information online. Some examples of different social media outlets and the kinds of information one can gain and how it may be used were provided. There are tools now that can analze publicly available employee information between companies to gain insight into who is working with who to make assumptions about such relationships. One can even gain enough information to follow through and try to confirm such assumptions.
It was a very enlightening session, but no silver bullets were offered in terms of how to deal with the problems. Today, it would seem awareness and general employee education of safe use are the only realistic solutions.
There are no tools to watch what people are posting today. Some organizations might be compelled to just block it all, but this often not a realistic solution—it is important to understand how different groups use social media. Policies and training geared at making users aware of risks and conveying some examples of how it can be damaging are the most powerful tools to social media security right now. Technological solutions are starting to move toward context-aware security controls, which will serve, to block applications (even specific capabilities within an application such as chat within Facebook) and not ports. Such controls can further apply to the role of a user to be a very effective solution.
In short, when it comes to social media security, be prescriptive to users and ensure they are aware of what is acceptable.
We at Dell KACE and Dell SecureWorks feel your pain. And, we have helped thousands of financial institutions of all sizes tackle their many security challenges and to become more efficient along the way.
If you are interested in learning exactly how we have helped others in your shoes, please plan to attend a live webinar entitled: Taming the security beast: How financial institutions can meet escalating threats and bring costs down.
You will hear from SecureWorks security expert, Andy Held as he hones in on the special set of security challenges you face and provides expertise on where to focus and how to provide greater protection for your company and your customers. You will also hear Ben Schreiner share his “war stories” about his many years on the front line, working for multiple financial institutions. We will also share a case study so you can learn how some of your peers successfully tackled the security beast.
The webinar takes place on July 11, 2012 at 10am PT, 11 MT, 12 CT. Register by clicking here.