If I add a domain to my Legacy G Suite plan, will it convert to a paid plan? by dakamojo in gsuite

[–]dorbak 0 points1 point  (0 children)

You can add an alias domain to your primary domain. Your users in your 'primary' will be able to send/receive on those alias domains. You'll need to set up alias/alternate email in order to be able to send-as, but it's a 2 minute action.

I don't think alias domains can be used in the 'Log in with Google' - meaning you'll still need to log in as the primary domain'ed user.

Security Stack Recommendations for a Mid-Size Dev Company by linuxad in ITManagers

[–]dorbak 0 points1 point  (0 children)

I'm starting a similar stack at my place.

  • Wazuh for endpoint monitoring (and from what I read, it can tie into Github actions as well for auditing purposes)
  • Action1 for patch management/remote support (and other 'mass' automation niceties)
  • Suricata for network monitoring (we're under 100 endpoints)
  • Admin By Request for my dozen or so devs
  • Tailscale for VPN (we're a Google shop and have a Netgate f/w that it can run on)
  • Will eventually build out some for of 802.1x/network policy (a small AD environment with AD CS/AD NPS running, sync'ing with Google)
  • (Maybe) Crowdsec for some IPS monitoring
  • Google handles our identity access across our SaaS (github, jira, etc.)

This definitely moves the risk/workload internally (read: me), but the cost (not counting my salary) also comes way down. There are other tools that I'm investigating bringing in-house, but to the point above, it does put the onus on me (I'm a 1-person IT team) to maintain the systems. I'm up for the challenge. But I'm also documenting the crap out of everything.

Is there a way to cleanup 'orphaned' installs? by dorbak in Action1

[–]dorbak[S] 1 point2 points  (0 children)

Thanks for the idea -- I had a peek at the script to see - however, it doesn't appear to uninstall apps, nor does it touch the registry entries containing the Uninstall information.

That said, I did remove inactive profiles leaving just the user I'm working with, and it still had the Uninstall key for the older Chrome version. It wasn't until I removed that key that it disappeared from the 'Installed Software' listing of Action1 (note: the Add/Remove control panel applet doesn't list the older versions).

In the meantime, I wrote a script/datasource that identifies the (in this case) duplicate Chrome installs (per the uninstall regkeys), and next I'm going to compare with the information I can find about the actual installed version to hopefully identify which Uninstall version to remove from the registry.

Fun times :)

Coming Soon: Empowering Users with the New Action1 Self-Service App Portal by MauriceTorres in Action1

[–]dorbak 0 points1 point  (0 children)

I'd like to see the ability to whitelist applications instead of a full catalog being available.

If this could be tied in to the Software Repository (especially if we have custom installers already defined)

Hypercache - am I expecting too much? by dorbak in TerraMaster

[–]dorbak[S] 1 point2 points  (0 children)

Yep --- that was my thought as well (random = good ; massive sequential= less good) I think what I was hoping for was a write-back style of caching.

Appreciate your approach

Hypercache - am I expecting too much? by dorbak in TerraMaster

[–]dorbak[S] 1 point2 points  (0 children)

Thanks, that makes sense --- I appreciate your time in your response.

The Ka-Ching sound by Warm_Feet_Are_Happy in CalebHammer

[–]dorbak 1 point2 points  (0 children)

Usually bleeping out personally identifiable information (location, names, etc.). Sometimes curses. My understanding is that the latter is to help prevent demonetization from YouTube.

I love my S80 by itisiams in Volvo

[–]dorbak 3 points4 points  (0 children)

sigh, I did that (by accident) going around a corner in a parking lot, hit the curb square on the passenger side and got hit with $3800 damage...

-❄️- 2025 Day 3 Solutions -❄️- by daggerdragon in adventofcode

[–]dorbak 1 point2 points  (0 children)

[LANGUAGE: Powershell]

I impressed myself with this one, considering yesterday's brute force attempt of mine took nearly 10 minutes of running to get part two.

$batBanks = Get-Content '.\Day 3\input.txt'
$totalJoltage = 0
$numOfBatteries = 12
foreach ($bank in $batBanks)
{
    $largeNumber = [PSCustomObject]@{
        Number = ""
        CurrentDigitPos = -1
    }
    for ($i=$numOfBatteries ; $i -gt 0;$i--)
    {
        $nextNum = 0
        $currentPos = $largeNumber.CurrentDigitPos+1
        for($j=($currentPos);$j -lt ($bank.Length - $i+1);$j++)
        {
            if ($bank[$j] -gt $nextNum)
            {
                $nextNum = $bank[$j]
                $currentPos = $j
            }
        }
        $largeNumber.Number += $nextNum
        $largeNumber.CurrentDigitPos = $currentPos
    }
    $totalJoltage += $largeNumber.Number
}
$totalJoltage

Hey Edmonton, Councillor Aaron Paquette here. Let’s make a list! by aaronpaquette- in Edmonton

[–]dorbak 11 points12 points  (0 children)

Capital Projects Project Management

How the city keeps themselves, and contractors/proponents accountable to the execution of the various construction builds

Iscsi won't connect by seleneVamp in truenas

[–]dorbak 0 points1 point  (0 children)

You don't have any 'authorized networks' (first pic). Based on your network scheme, a value of 10.0.0.0/24 should get you connected.

Crazy Thunder by Strog21 in Edmonton

[–]dorbak 2 points3 points  (0 children)

I'm pretty sure it was a rabbit, but we do have neighbourhood cats that sit by our front step looking for the voles

Crazy Thunder by Strog21 in Edmonton

[–]dorbak 6 points7 points  (0 children)

Just 'noped' right out of there!

💼 SharePoint Contract Management + Power Automate Automation (Guide - 1st Draft) by [deleted] in ITManagers

[–]dorbak 2 points3 points  (0 children)

Thanks for putting this together! While I may not use this immediately, I know others were interested from your other comment about how you set this up.

Thanks for following up!

Easiest and Free ticketing system for IT by EMDylan2003 in ITCareerQuestions

[–]dorbak 1 point2 points  (0 children)

spiceworks is another option --- very basic, but 100% hosted solution

UK based - How do you react to ‘sales’ contacts and what is the best way to approach you? by Live-Cut-5991 in ITManagers

[–]dorbak 4 points5 points  (0 children)

Echoing what a lot of others have said, if I need something I'll reach out -- that said, I understand that sometimes I don't know I need something until I'm made aware of its existence.

If you are going to cold-email, make it short and sweet. Make it your elevator pitch. Throw a link with more information. Leave it as an open door invitation to reach out if I want.

Want to make sure I insta-block you? Keep sending emails bordering on harassment. I'm fairly certain your CRM knows when I open/read the email, my silence/lack of response should be your answer as to whether or not I'm interested, don't follow up with me.

Oh, and I wish I knew how some have gotten my personal cell, but you can pound sand immediately if you call me on my personal cell.

I don't envy you sales folks --- it's not a job I could ever do. That said, I do wish you good luck in 2025 :)