Author Archives: penguyen

Thoughts on career


When I first began my career in 2005, I was desperate to get into IT after spending 6 years in the Navy. It was tough breaking into the field. I was working toward my MCSA at the time. I eventually received an interview nearby where I was living at the time. The job was for […]

Thoughts on Blockchain as a security mechanism


Blockchain is a solid argument given what happened to #equifax incident. The financial and healthcare world, along with anyone managing other’s PII and financial records should be required (or incentivized) to implement a distributed, decentralized, #blockhain database of information coupled with your typical industry best practice layered security model. Imagine a world where #blockchain is […]

Cyber Kill Chain


In 2011, Lockheed Martin introduced a concept called Cyber Kill Chain. It outlines the following 7 steps of a cyber attack: 1) Reconnaissance 2) Weaponization 3) Delivery 4) Exploitation 5) Installation 6) Command and Control 7) Actions on Objectives A well designed Cyber Security program would allow an organization to monitor, alert, and disrupt the […]

Thoughts on Information Security and Compliance


In today’s industry, being in compliance doesn’t make a company secured. Being in compliance means a company met the minimum requirement or have workarounds for some of the risks they can’t mitigate. Asking if a company is in compliance is like asking a student if they have done enough work to get a C grade. […]

Windows Update unable to detect new updates


We ran into an issue with Windows Update where it failed to detect new updates. Below is a Msft article which I copied and pasted here in case it ever disappears from the Microsoft site: How do I reset Windows Update components? Email Print If you receive a Windows Update error, try the steps in Fix […]

SCCM – Creating Device Collection using OU


Query: select SMS_R_SYSTEM.ResourceID,SMS_R_SYSTEM.ResourceType, SMS_R_SYSTEM.Name, SMS_R_SYSTEM.SMSUniqueIdentifier, SMS_R_SYSTEM.ResourceDomainORWorkgroup,SMS_R_SYSTEM.Client from SMS_R_System where SMS_R_System.SystemOUName = “DOMAIN.LOCAL/OU1” If you have sub-OUs, and would like to exclude those sub-OUs from your query, you can add the following: and SMS_R_System.ResourceID Not In (Select ResourceID from SMS_R_System Where SystemOUName like  “DOMAIN.LOCAL/OU1/SUB-OU-1-TO-EXCLUDE” or SystemOUName like “DOMAIN.LOCAL/OU1/SUB-OU-2-TO-EXCLUDE”) So the entire Query would look something like: […]

SCCM: Logs to check when troubleshooting software updates.


Server Side Software Update Logs: SUPsetup.log – Installation of SUP Site Role. WCM.log, WSUSCtrl.log – Configuration of WSUS Server/SUP. WSyncMgr.log – SMS/WSUS Updates Synchronization Issues. Objreplmgr.log – Policy Issues for Update Assignments/CI Version Info policies. RuleEngine.log – Auto Deployment Rules. Client Side Software Update Logs: UpdatesDeployment.log – Deployments, SDK, UX. UpdatesHandler.log – Updates, Download. ScanAgent.log […]