So I was rummaging around with O365 and happened to come around a very nice feature, I never noticed this before – but I would consider this to be very useful so why not share the joy…

You likely know about Rules in the Outlook desktop app, this is really useful to create sorting rules for incoming email. Thus you could make a rule that moved mails from a person or mailing list to a subfolder, or if you are a pro you could also add tags and what not – all very useful. The rules however require a bit of configuration, not a lot but just enough that it is one of those things I never got done.

Now however I found that “Rules” have a little-sister, “Sweep” and it is more or less just that, a virtual “broom” to help you out.

Sweep is VERY similar to Rules but it is just a tad “easier”, you don’t need to configure “complex” rules where you need to consider who is the sender, am I the only recipient etc. etc. You can set it up with a few clicks.

Here you see it in the online Outlook version, and as I recall you actually need to set up the actions here and not in the desktop version. It makes sense as actions configured here will work in the background where actions setup in the desktop Outlook app often require Outlook to be running to work. To access the online Outlook app just go to https://outlook.com

Here you see the “Sweep” action.

So what is sweep and why is is something you might wanna look at?

Well Sweep can be used ad-hoc or as permanent actions that run in the background just as rules. Sweep is the friend you wanted as a child, the helpful friend that would help you tidy up your room – in this case your inbox..

What you do is, you click on one of the thousands of mails in your inbox that you need help with cleaning up – here I am not thinking so much on emails that you “care” about, more like those emails you “need” to get as information or notification but that you just often forget to delete after reading.

So in my example here, I have an email from the “Outlook team” with “important” information, so I mark it and click on the “Sweep” button.

And now I get a list of options, and as you can see we can do different things.

Move all messages from the inbox folder

The top action is for ad-hoc use, thus it is an action we can use here and now if we are performing a cleanup act here and now – if we were to just click “OK” now Outlook would move all mails from the “Outlook.com Team (member….” to the “Deleted Items” folder.

Move all messages from the inbox folder, and any future messages

If we were to click the second option, then the same would happen but Outlook would also implement a new running action that will make sure to do the same for new emails that arrive in the future – so if I did that here all mails from the “Outlook.com Team” would be deleted without me ever seeing them – perhaps not quite what I would want to do – (NOTE: I call it action even though rule might be a better word, however it is to avoid confusing it with the “old” Outlook feature called “Rules” as this is not quite that).

Always keep the latest message and move the rest from the inbox folder

If we were to choose option Three, then Outlook would keep count and only keep the latest email from the “Outlook.com Team” – this could be VERY useful for random newsletters, you get to keep the last one and Outlook will clean the old versions up while you do other important stuff. And this is a nice twist to the old “Rules” Outlook offered, because now you get to keep that ONE email in your main inbox flow, where earlier you would likely have copied this newsletter to a subfolder for later reading and manual clean up.

Always move messages older than 10 days from the inbox folder

The fourth option is a twist of the third option, this will allow for emails to live for up to 10days in your main inbox flow and THEN be moved or deleted. You may like me get a lot of notifications from your servicedesk system, some that require attention others that don’t but difficult to filter as they may be fairly similar – now I can just mark mails from the servicedesk and say that after 10days they will be moved to an archive – thus if I don’t get around to tidying up my inbox, Outlook will come to my rescue after 10days.

The last “option” is the “Where” option, I can choose to just simply delete stuff or I can move it to a folder in my Outlook.

You can select the “destination” no matter which of the options you work with.

The above also works for personal Outlook accounts (Free Microsoft Outlook mail accounts).

O365

If you are working on a corporate Outlook account, then you may have even more nice options, your administrator may have enabled “Retention policies”. This mean that for each folder you have in Outlook you can configure automatic cleanup procedures, eg. you may have an archive folder and you can configure that emails in this are automatically deleted after 365 days (or 2,3,4,5…. years). Your options here rely on what the administrator have set up.

You can setup these “Retention Policies” either per folder or even on single emails, so if you get an email that you need to remember to delete after a period you can just assign this “Retention label/tag” to that email and Outlook will make sure you are compliant (eg. lets say you have a corporate policy that you need to erase this type of emails after 30 days – now you will not have to loose sleep in case you forgot – Outlook is your “bit..” 😉 )

Here is an example of an e-mail that has been tagged with a retention policy – you can tag individual mails or folders.

Anyway, the fun does not stop there – now you can combine this “Retention label” with “Sweep” and get even more automation. You create “Archive Folders” and then assign these “Retention Policies” and then utilize “Sweep” to sweep mails to these folders, and then Outlook automatically clean-up for you in compliance with compliance policies.

What is not to like..

Pitfalls

Are there pitfalls, sure. Automatically configures sweeping is configured to run 24/7/365 – and lets say you take a 2 week vacation – things may have been “Sweeped” that you did not notice. Also, things that are “sweeped” is not processed in any way – if you create rules you can mark mails as read or assign various labels etc. this is not true for “Sweeped” mails, these will remain as they were in your main inbox (thus may be read or unread).

Settings

If we look in settings we can see that “Sweep” and “Rules” (the old/original Outlook feature) is not quite the same but have different configuration panes.

What do you do to keep your inbox clean?

I keep struggling to keep up with emails – they come at me as a virtual torrent, previously I had configured some rules for some mails – but I really like these new options, I think they can be very useful in keeping up.

By Michael Møller, ReadMyDamnBlog autor.

The ever so helpful Microsoft Corp has decided to assist you with yet another new feature, one or more icons in your searchbar (next to the start menu).

So maybe you are an old grumphy man like me that despice changes to the GUI and just want it gone, or maybe you are a sysadmin and wish for it to not bother your users. Like I don’t get it, stuff that enables strange slide-up menues are just not very smart in my book, in my last sysadmin position people worked with drawing applications and if their mouse just happened to strafe the bottom of the screen up came weather reports, news and now also previous search results – in my book a big no go, ok people should have the right to enable this, but default setting should be off.

So how to get rid of it.

Well, through the GUI, you do like this;

  1. right click the search menu
  2. move to “2” Search
  3. uncheck “Show search highlights” – This will remove the icon/icons in the search menu
    (ProTip: you can also opt for just unchecking “open on hover”, then the search menu will only expand if you click on it)

SysAdmin tip;

To get rid of it through registry

My suggestion is to make a GroupPolicy Preference deployment of that registry setting, and horray you and your users are again masters in your own OS.

Enjoy.

#DynamicSearchBox #Windows10 #ButWhyMicrosoft

2015-06-10 15_59_50-cryptolocker - Google Search - Internet ExplorerAfter experiencing Ransomware a few times during the past months in our corporate setup I decided to scribble down some cleanup notes and things you can do to combat this.

This guide is seen from the point of a sysadmins and thus not from an enduser, however some tricks may apply even so (depending on various factors). In addition, this guide focuses on the cleanup of the server and not the client computer, which in my opinion always should be reinstalled after an incident like this.

This guide also assume that you have Shadowcopy enabled on your server; if not then you will need to go for a restore from backup (this however also loosely covered in the guide).  See the good thing about Shadowcopy is, that as the server is not infected nor is the servers shadowcopy – you thus have quick access to non-corrupted data from here quite easily and quickly.  Client wise things are different as most ransomeware clears the shadowcopy locally to ensure against easy cleanup locally, I heard that this may fail if the user is not a local administrator on his/her pc, so you may still have a straw to cling to if this is the case for recovering the local data easily.

Background.

First, let me sum up what this ransomware is all about.

Ransomware is a special type of malware, opposed to a regular virus it is not as much aimed at spreading but more focuses on its area of business (to extort users to pay to regain access to their data).  Ransomware is often spread via phishing mails, you may receive a mail stating that you have a package at the post office (just one example) and that you need to download and open the linked file to get the details.  Once you download and run the file from the phishing mail, it will execute the ransomware software, which will run in the background encrypting your files without you noticing it (to begin with).

It is very hard protecting against malware like this, as the makers of this type of malware keep changing the software to avoid detection.  Furthermore, antivirus is only of limited help as it cannot restore files that has been encrypted.

Ransomware usually starts by encrypting local files first and then move on to server shares.

Ransomware is actually not a new thing; it has existed since the MS-dos days in some form or other. I recall a very old virus that infected your boot sector, and upon the trigger event (could be a date or a number of boots) it would delete your fat table and bring up a slot machine, if you won the game you would get your FAT table back if not everything was lost.  Same but different.

How to get your data back after it being encrypted?  Well best bet is backups, hopefully you have either backups on some USB disk or in the cloud, if not you are likely in serious problems.  You can also choose to pay the ransom and have your data de-crypted, the price for this is usually around 100€ or 100$ depending, and from what I have heard it should work quite well and reliable to get your data back this way – some of the ransomware vendors should even have kind of customer support to assist you if you have problems – but supporting organized crime hardly seem like a good idea in the long run.

Anyhow, let us move on to the “fun” part, how to clean-up a file server after a visit from a client infected with ransomware.

So you have been struck by Ransomware (Cryptolocker, Cryptowall, Cryptodefence etc etc etc), “congratulations” and welcome to the club 🙁

Let us go through some steps to get things back on the road.

Important tip;

If you are using Shadowcopy on your server, DO NOT START CLEANUP BEFORE DATA HAS BEEN RESTORED – you may just waste storage space from your shadowcopy pool and thus be able to restore less data.

 

Step 1 – Stop the disaster from escalating.

You need to figure out which user is infected and stop this users pc from encrypting more files on your servers, if you are not fast to react your server will quickly look like this (the white is the infected files, it’s a mess).

Step 1.1 – how to identify the user

There are obviously different tactics for this, but two obvious once are;

1) look at an encrypted file and determine the owner – now to my surprise this did not work on the last server I looked at, here all the files for some reason was set to be owned by the local administrator group.

2) Look at the home folder for your users – most ransomware drop files on how to decrypt your data and these may serve as tell tail signs of “infection”.

2015-06-10 15_33_47-mRemoteNG - confCons.xml2015-06-10 15_29_46-mRemoteNG - confCons.xml

Thus, the user with all the “decrypt” files in his homedrive will be the user you are after.  Simply search the user’s folder for files with the word “decrypt” in it. The ransomware normally also targets the users local drives first, thus you may catch a lucky break if you like us have redirected the “My Documents” folder to the users home directory on the server, in our cases this meant that the infected users had tons of these files on his home share.

Step 1.2 – Shutdown the user’s computer

Shutdown the user’s computer and change the password of the user (as the user has malware on his/her computer his/her passwords (all of them) are likely now compromised.

 

Step 2 – Assess the damage

You now need to look at the server to determine how much data have been encrypted. How to determine the “infection” rate, well that depends – different ransomware uses different tactics, however at least for now they seem to share these tactics.

1) The ransomware will encrypt files, then add some extension to the file to show that it is encrypted (the extension may vary, but could be .encrypted or .iufasee or something totally different/random – but still the same for all encrypted files).

2) After encrypting a complete folder ransomware will often add 2-4 files that pertain to how to decrypt data, these files could be named “HELP_DECRYPT.TXT” / “HELP_DECRYPT.BMP” / “HOW_DECRYPT.TXT” / “!Decrypt-All-Files-iufasee.bmp” or anything like that.

2015-06-10 15_29_46-mRemoteNG - confCons.xml

NOTE: the ransomware is quite clever as not to change the creationdata/last modified date as this makes it hard to just look for files changed in the past 24h – however, as I mentioned in step two then the ransomware often creates “how to decrypt” files/pictures/links in the folders and these may be used to spot the “infection”.

My suggestion is;

  1. Try to determine the file extension using the tips above.
  2. Use Windirstat to get an idea of the scope of the incident (you can see an example below) http://windirstat.info/
  3. See screenshoot (the white is the encrypted/infected data).

cryptolocker

 

Step 3 – Restoring data (the non-encrypted files)

See we had a special challenge with restoring data as we use online backup, and the restore hence will take a LONG time seeing that the data need to come from the WAN restoring gigabytes of data would take a LONG time, so we had to get creative to make the cleanup as fast as possible.

You first need to determine the time for the last backup/shadowcopy snapshot before the “infection” occurred.

If you have shadow copy, then go back through the snapshots to find the time where files had their original extension. You may get best results if you look at the infected users home folder, this is likely the first folder to be “infected” (you can also look at the creation date/time of the “how to decrypt” files which may give you a lead).

2015-06-10 15_29_46-mRemoteNG - confCons.xml

If you have local backup it is quite easy I guess, just restore more or less all data (with the do not overwrite newer/changed versions option set) and then proceed to delete the encrypted data and the “help files” (the once on how to decrypt) – see section below on how to cleanup.

If however you cannot easily restore data from backup (like e.g. if you use “online backup” like we did), then move to shadowcopy (which you hopefully have enabled on the server).

You could of cause restore one file/folder at the time from shadowcopy, this will take forever especially if users have worked on the folder structure meanwhile. So why not make it fast and easy by using robocopy (yes it is actually possible to use Robocopy, we found a cool way to do this).

Restoring non encrypted data via ShadowCopy and Robocopy.

  • Determine the “last good” shadowcopy, the one just before files started to be encrypted.

 

    1. On the server list the shadowcopy snapshots using the dos command, you do this to get the “identifier” which we will need in a moment.Start an administrative command prompt and issue the command;
      vssadmin list shadows
      (you may need to change drive to the drive you want to see)This will give you a long list of available snapshots, see screenshot.
      2015-06-10 15_00_00-mRemoteNG - confCons.xmlLook for the creation time and find the block just before the incident occurred.

      In this block “Contents of shadow copy set ID {…….}” look for the line “Shadow Copy Volume”, copy this line to a notepad starting with \\

      In this example;
      2015-06-10 14_56_13-mRemoteNG - confCons.xml

      \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy107
      NOTE: the number at the end will be different for you.

      IMPORTANT! Now add a “\” to the line in notepad: \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy107\

      Finally add a prefix of “mklink /d c:\restore ” to the line in notepad.
      So the final line should look like this;
      2015-06-10 15_12_14-mRemoteNG - confCons.xml

      mklink /d c:\restore \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy107\
      (note: the c:\restore is a folder/name YOU choose, it can basically be anything you choose, the name must NOT exist before you run the command)Now run this command from the administrative command prompt.
      2015-06-10 15_09_35-mRemoteNG - confCons.xml

      It should give you a feedback much like;
      symbolic link created for c:\restore <<===>> \\?\GLOBALROOT\Device\HarddiskVolum eShadowCopy107\

      2015-06-10 15_13_13-mRemoteNG - confCons.xml

      Now if you write;
      dir c:\restore
      you will have a historic view of how the disk looked at the time of the shadowcopy snapshot, you could get the same via properties “previous version”… but this is much neater as you can access and script it.

  • Now we have the snapshot mounted we can run a robocopy job restoring any data that is not more recent or changed.In this example the command would be something like;ROBOCOPY C:\restore D:\ *.* /XC /XO /E /LOG:d:\restore.log
    2015-06-10 15_18_12-mRemoteNG - confCons.xmlYou will need to suit it to your environment.

    Things to make a note of are the /XC /XO command switches which ensures that we do not overwrite files modified after the “infection”. As the encrypted “infected” files have a different extinction this is not a problem.

    After the restore you can review the restore.log file to see if anything went wrong and see how much data was restored.

    Note, you MAY run into the problem that not everything was in shadowcopy in which case you have to revert to backups, in the incidents we have had “only” 10-20 gb of data was “infected” and our shadowcopy could easily accommodate this.

 

 

Step 4 – CleanUp

Final step is to clean up the encrypted files and the decrypt instructions.

Also remove the “directory link” to the shadowcopy snapshot if you used that (see previous section), you can just use “RD <directory name>”.

2015-06-10 15_13_13-mRemoteNG - confCons.xml

I used SearchMyFiles from http://www.nirsoft.net/ as it is easy and very customizable to use to find files, I suggest you take not more than 10.000 files at the time as deleting many files takes quite some time.

2015-06-10 16_41_29-2015-06-10 10_41_17-mRemoteNG - confCons.xml.png - Windows Photo Viewer

 

Mitigation strategy

  • On fileservers, try to limit access as much as possible – if nothing more than look at making data read-only wherever possible as this alone will protect you greatly.
  • FSRM – File Server Resources Monitor, set this up to detect and trigger alarms on new files where the word decrypt is part of the name – decrypt as part of a filename is uncommon enough to give only limited false alarms – I will create a separate article on the configuration of this later.
  • Supporters / super users – instruct them to react FAST to tell tail signs of ransomware, the faster you manage to stop the “infection” the less to clean up.

 

Tools that may be useful;

Decrypt Cryptolocker (this most likely will not work, but give it a go anyhow just in case).
https://www.decryptcryptolocker.com/

Windirstat                                     http://windirstat.info/
SearchMyFiles                              http://www.nirsoft.net/

Read more about Cryptolocker; http://en.wikipedia.org/wiki/CryptoLocker

Thanks to:

Torben Slaikjer for finding that link on how to mount shadowcopy snapshot as a directory, this made the job vastly easier.

2015-01-21 13_51_10-Program ManagerSo maybe you experience that opening a Word document takes FOREVER?  This could be a document from a coworker or an old document from wayback when..

See the thing is that Word documents may be referring to an old office template that no longer exists, this mean that every time you open the document it will attempt to open a template file that no longer exist – Word, Excel etc. may now take several minutes to figure this out – and meanwhile you will be starring at a logo just waiting and hoping..

So my thoughts were that there must be some setting in office that could bypass this, I managed to find several posts about the subject but it took some time to find a solution that worked for me.  I guess you could just open the documents one at the time and then save them with a different name, that is likely to loose the link to old templates – however if you have MANY such documents this is not a viable solution.

So I finally ended up finding a sweet little utility that will “fix” your Word Documents, it may still take a while – but you can start the program and have it running in the background traversing a folder structure.

Sweet.

SOLUTION!
You can download the software here;
http://www.cjwdev.co.uk/Software/EditAttachedTemplates/Download.html

2015-01-21 14_44_20-Program Manager

 

 

 

 

 

 

 

 

 

read more about it here;
http://blog.cjwdev.co.uk/2010/04/07/edit-attached-templates-for-word-documents/

NOT THE SOLUTION (For me at least);
What I found that did NOT really work for me was;

http://support2.microsoft.com/kb/830561

http://www.ehow.com/how_7285906_remove-template-word-document.html

You can see what template your document refers to by opening it, and then..

Navigate to here (Word 2013);

FILE -> OPTIONS -> ADD-INS -> MANAGE -> “Templates” -> GO
2015-01-21 14_28_20-Program Manager

 

 

 

 

 

 

 

 

This is the problematic setting;
2015-01-21 14_31_05-2.doc [Compatibility Mode] - Word

If you ever worked with any kind of support you are likely to know the sittuation, a user has a problem – you implement a fix, ask the user to get back to you if it worked or not…  Well he/she NEVER does get back to you, instead you have a case hanging open for weeks till you contact the user for a reply or maybe the user call and complain a week later and ask why you did not do anything!?

Fustrating right!?

Well here’s a neat little trick I picked up for those of you that use Outlook/Exchange in your orginazation..

You can actually add a reminder for your email!?  Yes, I know you may say, but did you know that you can add the reminder not only for yourself, but ALSO for the RECIPIENT!?

Neat right, but how does it work you say!?

  • Well firstly – you just write your email as usual.
  • annoy1  Second – you move to “Follow Up” and select “Custom”

annoy2

  •   Finally – you add the reminder and the caption for the recipient

annoy3

On the given date and time the user will get a reminder on your email (via his/her own calender) and thus be more enclined to reply to you..

Now is that not neat or what!?

 

 

Do you for some reason need to keep track of your time?

Let’s say you work in a helpdesk and need to keep track of what you spend your time on, or perhaps you are an independent consultant and need to register when you use time on clients.  There is a lot of reasons why you may need this.

Anyway here is a very cool free utility to assist you in doing just this, it is very easy and intuitive to use and implement.

Watch and learn 🙂

Software can be downloaded here;
http://www.epiforge.com/Grindstone/


 

This is, as with many of my other posts, mainly a reminder to myself to remember something cool I once stumbled across. More than once I have had to search high and low to remember this site, it is cool but not something you need every day.

This site offers many different server, user and other management solutions, common for all is that they are integrated as webserver services – thus you can delegate management (Provision) assignments (server management, user management, self service and what not) to AD users without escalating their AD rights..  An example, you can assign “Joe the plumber” (a regular Domain User) rights to reset passwords for all the other Plumbers in his department – thus freeing help-desk personnel to do more important assignments.

How it works, well it’s fairly simple actually – the solution/product run on a web-server, here a service account has “Domain Admin” rights (or lower if required) and can thus perform the various tasks that users ask it to do via the web-interface – the solution/product (web-application) then manages who can do what and furthermore logs all that is done and by whom.

The site offer several 30 day free evaluation versions some of which will even work as free versions (limitations apply) after the 30 days.

The solutions are used by numerous large companies (NASA, Sony and GE Capital just to mention a few) so it cannot be completely off.

See more here;
http://www.manageengine.com/products/ad-manager/index.html

Other tools in the same product range;
http://www.quest.com/active-directory/

A YouTube web-cast of Quest’s solution (1 hour);

A YouTube video intro to AD Manager Plus (not super good nor official, but it may give you some idea);

Microsoft is also about to release solutions that can perform some of these tasks;
http://www.microsoft.com/systemcenter/en/us/service-manager/sm-end-user.aspx
http://www.microsoft.com/systemcenter/en/us/essentials/sce-overview.aspx

Did you just recently upgrade from Office 2003 to 2010 or are you just having problems finding some obscure feature from Office 2003 in 2010?

Well, try this on for size;
http://office2010.microsoft.com/en-us/word-help/learn-where-menu-and-toolbar-commands-are-in-office-2010-HA101794130.aspx?origin=HA010370239#_Toc256784678

It’s actually really cool, you get to select the feature in the Office 2003 gui and is shown an animation of how to find it in 2010.   And as 2010 and 2007 are very alike then this may also work for Office 2007.

You have likely been in this situation before, you paste a large ACSII text into a word document and word makes these annoying double line breaks (new style carrige return) and you actually just want a linefeed.   Well you can change every instance manually but that would take forever, so here is how to do to fix it via a simple “Search and Replace”.

  • Mark the text you want ‘changed’
  • Select “Replace” from the top menu
  • Enter;
  • And execute, that’s all there is to it 🙂

I got the first hint here
And there is a bit more on formatting/fieldcodes here