Spiceworks Helpdesk in secure environment

Hi,
I work in an area where access outside the LAN is not possible, and using a proxy is banned.
Can i run Spiceworks within this restricted environment, or must i look for an alternative?
This topic first appeared in the Spiceworks Community

You first have to have a look at the security policies
so you can see what restrictions your company has.
These policies and the requirements of the busines-
case reflect the architecture you design. From a tech-
point of view, you can have from 1 to a lot of tiers...
If you are using a DBMS, Tomcat and Apache and your only restriction is the port 80. So you integrate
Tomcat into apache and apache then forwards the
requests to tomcat what is kept within the server. It
is again a question of your policies and business
requirements (performance, scalability, availabilit
etc) how your DB-server looks like and where you place
it. While using JSP and servlets, you can talk to any
DB-server reachable by the network.
The use of applets has as well be dicsussed and
depends on your target audience, because some
companies drop applets with the firewall and these
people can in this case not profit from your web-
application.

Similar Messages

  • How to open -pdf in a secure environment

    Opening PDF files from a secured account on Internet (e.g. telephone billing info) does not work. in Safe as the file is shown as _pdf (underscore instead of dot).  We suspect this problem started after installing CS6, but are not sure. Win 7, IE 9, Reader XI

    PDF on a regular website can be opened and downloaded. However, PDF on a secure website (https) looks normal with normal icon but double click gives screen for open / save / save as. ‘Open’ gives no result, no error message either. ‘Save’ or ‘save as’ shows screen with filename ending on _pdf, which cannot be opened or saved, no error messages either. Changing the filename into .pdf gives the same reaction: nothing happens, no error messages.
    The same files can be opened on a different PC win7, IE9, Reader XI and similar software, but without CS6.
    Van: Pat Willener [email protected]
    Verzonden: 3 november 2012 5:19
    Aan: EllyHo
    Onderwerp: how to open -pdf in a secure environment
    Re: how to open -pdf in a secure environment
    created by Pat Willener <http://forums.adobe.com/people/pwillener>  in Adobe Reader - View the full discussion <http://forums.adobe.com/message/4820274#4820274

  • Enterprise Manager in secure environment with no internet access

    I have Oracle 11g installed in a secure isolated environment, which means there is limited access to the servers, and definitely no internet access from that environment.
    I am looking to configure Enterprise Manager / Database control.
    I can successfully start up the application server on my database server, and connect to this from a web browser within my secure environment.
    However when I try to display the Performance tab, nothing is displayed.
    I understand this screen uses an ActivX component.
    Is the use of the ActivX component going to have problems because my servers have no direct internet access, or should this not make any difference?
    Thanks
    Paul Graves

    No this is not going to make any difference.
    You don't need any internet connection at all for working with OEM GC.
    Maybe, if you want to configure the Patch Setup to receive Patch Adviories from My Oracle Support, but even then you can do without a connection from you server(s) to the internet.
    Asuming that you are using OEM GC 10.2.0.5, you will also be needing the installation of Flash Player and Adobe SVG Plugin, both to be installed in your browser.
    Kind regards
    Rob
    For more information on working with OEM GC, you might want to check http://oemgc.wordpress.com

  • How can I Remove Firefox Hello in a high-security environment?

    Hi,
    After a recent Firefox update in a test environment for a high-security environment (I'm not at liberty to disclose the nature of this environment, sorry. Let's just say we have to disable Firefox from contacting Mozilla's servers and further disable Google's "Safe Browsing" due to possibility of inadvertent unauthorized disclosure) We have noticed a feature: "Firefox Hello", this feature causes Firefox to violate strict policy as it transforms it from being classified as strictly a "Web Browser" (which is permitted) to a "Chat Application", all of which are completely banned. Simply disabling Hello is not a sufficient option as Firefox still contains the code to run Hello, which still constitutes it a "Chat Application" as per policy. We have the capability to edit out unauthorized code from open source software internally, but we don't know where to start to remove this code from the Firefox codebase as Hello seems pretty well integrated.
    Currently I only have two options, both of which do not please me as for me personally, (I really like Firefox and have fought to include it in any environment I can):
    1. Discontinue permanent use of Firefox.
    2. Discontinue updating Firefox permanently or until Hello is removed as a non-modular element. This is unacceptable as it'd mean we can't keep it secure, which causes us to fall back to (1).
    I would graciously like any third option. Internet Explorer seems to be the only browser that provides sufficient enterprise-level control without extraneous features at the moment with the addition of Hello to Firefox. We have banned Chrome from our environment due to how tightly bound it is with Google's "Cloud" services and hope that Firefox isn't becoming a "Cloud" browser for Mozilla, Sync has already placed Firefox under the microscope as it is.
    Thank you.

    We have WebRTC traffic blocked (We have a setup that audits SSL traffic before it leaves or enters the network).
    Our primary issue with Hello is that policy classifies the actual code used to run it as being very much like an Easter Egg, code that was inserted that goes beyond the spec of being a web browser and thus difficult to audit. It's easy to block services in general, but when an a single unauthorized service becomes a core feature and has code strapped to the browser, that throws up red flags that Mozilla is moving Firefox away from being a organization-managable browser and more toward an exclusively mozilla-managed "Cloud" browser, where there is a possibility that Mozilla will seek more control over user experience that will increase attack surface.
    It's reasons like this we decline to install Chrome into our environment, because Google has several services built-in to the core of their browser and do not leverage their extensions capabilities, but rather mandates that these features "must be installed" and that users can only toggle them off.
    It's easy to uninstall an extension or to recompile with a flag, but it's hard when a vendor makes decisions for you and tells you "This is good for you, you must embrace it" irrespective of policy of organizations or even individual users wishes.
    Thank you all for this information, it will help our future audits and help determine if Firefox is right for our needs.
    Unfortunately I can't mark this thread as "Solved" since the root issue is still not solved (Mozilla's development practices making something that should be an extension, a core aspect of the browser), so marking it solved would be a lie. But thank you both nonetheless.

  • Saving Opened attachments in a secure environment (no local drive access)

    We are evaluating Windows 7 and Office 2010 in a secure environment and have a strange issue when saving opened Office attachments from Outlook 2010.
    If an Office (Word, Excel or Powerpoint) file is opened from a received email within Outlook 2010 and a user then attempts to save, they are presented with a restriction error message as below:
    This operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator.
    Upon clicking OK, they are then presented with a Save As dialogue box in the correct location (i.e. their redirected Home Drive location on a network share).
    We block any access to the C:\ drive (or any local drives other than the optical drive) and the users have a roaming non-cached profile.
    The OutlookSecureTempFolder value in the registry is C:\Users\%username%\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\RANDOMSTRING\
    I tried altering this to a network location which I knew the user would have write access over, but Outlook just overwrote my custom value with a new one of its own.
    I ran ProcMon and determined that the machine is getting ACCESS_DENIED when trying to create files in that location.
    Any ideas?

    I've the same problem too.
    to have more than one approuved locations displayed, you have to enable this policy too:
    Places Bar Locations
    the office 2010 GPO.
    Specify the same locations you have approuved in the other GPO
    click User
    Configuration, click Administrative
    Templates, click Microsoft
    Office 2010, double-click File
    Open/Save dialog box, and then click Places
    Bar Locations.
    Problem solved for me.
    Thanks to all of you. I've spend a lot of time on this problem. 

  • Secure Environment  - SSL

    Hi
    We recently move an app from a development environemnt to a production environment using SSL. When we navigate from one screen to another ( on nearly every screen ) we get the message about leaving and then entering a secure environment. However, all is within the same application so we should not be leaving and re-entering. The production application is accessed through a web server which just proxies through requests.
    Any help is appreciated

    Not using hardcoded links, the problem was being caused by a popup window that
    tells you the application is loading data. We removed this and the issue went
    away.
    thanks for the response
    "Kai" <[email protected]> wrote:
    >
    Are you using hardcoded links starting with http://?
    kai
    lanoc <[email protected]> wrote:
    Hi
    We recently move an app from a development environemnt to a production
    environment using SSL. When we navigate from one screen to another
    ( on nearly every screen ) we get the message about leaving and then
    entering a secure environment. However, all is within the same application
    so we should not be leaving and re-entering. The production application
    is accessed through a web server which just proxies through requests.
    Any help is appreciated

  • How do I make a "security environment"?

    I need to do something I don't even know if is possible..
    We have a code that handle crypted data, and we have another software that is open source and need to manipulate this data, both are desktop stand alone softwares.
    I'm wondering, is there a way to create a "secure environment" to use the open source software as a plugin, restricting this software's access do external world (I don't want it to externalize my decrypted data)?
    Any help would be appreciated.

    You can install a home grown SecurityManager in your main application. Whatever security policy you define for that SecurityManager will apply to plugins and libraries. You can forbid socket access, file access, system properties etc etc.
    You have a steep learning curve. A starting point is [http://java.sun.com/docs/books/tutorial/security/tour2/step2.html|http://java.sun.com/docs/books/tutorial/security/tour2/step2.html].

  • How do I sign an Abode document with a secure environment?

    How do I sign an Abode document with a secure environment?

    If this is related to Adobe Fill & Sign (since you did submit this feedback through the Feedback form) this is an FAQ on security: https://www.acrobat.com/en_us/security.html
    I am not sure if that really is what you wanted, if that doesn't answer please provide more details.
    Thanks,
    Josh
    PS - You might want to look at Electronic Signature Software, Digital Signatures | Adobe EchoSign to see if that fits your needs
    Also Electronic signatures, e-signatures | Adobe Acrobat XI

  • Does anyone know whether iTunesU can be used in a secure environment for corporate training? Looking at previous posts it does not seem like it?

    Does anyone know whether iTunesU can be used in a secure environment for corporate training? Looking at previous posts it does not seem like it?

    Sorry, but iTunes U is only available to K-12 public school districts, private schools and two- and four-year accredited, degree-granting, public or private colleges and universities. It's not available for corporations.
    Regards.

  • How far can i go with spiceworks helpdesk ticketing system?

    No satisfaction form.  You can ask the user to comment on the ticket about the experience before closing it.
    There are plugins and scripts that can enhance or modify different aspects of the system.  Just not on the grand scale you are envisioning.

    hey,
    i have installed spiceworks helpdesk on my network and created a custom but simple form for users to fill when they need any technical support. and i have also activated the email notification (integrating with exchange server)
    but my question is, how far can i go with this helpdesk system? how well and pro can i go with it? can i let the end user submit some kind of a satisfaction form after the technical guy finishes the support? how well can i enhance all both end user and admin experiences with this tool?
    This topic first appeared in the Spiceworks Community

  • Application architecture in secure environment

    Hello,
    I am currently designing an enterprise application that will use a DBMS back-end. My environment has the DBMS and Web (Tomcat) servers sitting inside a very strict firewall, allowing only port 80 access. I need to know what is the best architecture to use for my application, given the several tiers and the firewall.
    Should I use a 3-tier, with the DBMS being 1 tier, the business logic in a servlet, helping circumvent the firewall, and the UI in an applet and/or HTML/JSP page?
    Thanks,
    haighaig

    You first have to have a look at the security policies
    so you can see what restrictions your company has.
    These policies and the requirements of the busines-
    case reflect the architecture you design. From a tech-
    point of view, you can have from 1 to a lot of tiers...
    If you are using a DBMS, Tomcat and Apache and your only restriction is the port 80. So you integrate
    Tomcat into apache and apache then forwards the
    requests to tomcat what is kept within the server. It
    is again a question of your policies and business
    requirements (performance, scalability, availabilit
    etc) how your DB-server looks like and where you place
    it. While using JSP and servlets, you can talk to any
    DB-server reachable by the network.
    The use of applets has as well be dicsussed and
    depends on your target audience, because some
    companies drop applets with the firewall and these
    people can in this case not profit from your web-
    application.

  • Spiceworks on a secure network

    I would REALLY like to use Spiceworks to maintain baseline device information on my secure network, but it cannot have any connections to the Internet.  Is there any plan to offer a version that can be installed and run without an Internet connection, even if there is fee to help offset the cost of not having ads?  My company would be quite interested in such a product.
    This topic first appeared in the Spiceworks Community

    Hi,Having problems receiving emails from mailchimp, they're often being blocked as spam, I opened up a support case with Microsoft who initially created a rule which allowed anything from ourdomain.com to bypass the filters... which obviously let lots of dodgy emails through,I got back onto them and they modified the rule to set the SCL to -1 from any of mailchimps IP addresses in the form 205.201.128.0/20198.2.128.0/18
    I've had reports that this still isn't working and looking into it further is seems you can't use CIDR as low as /20 in office 365 rules. I've modified the rule to cover the ranges 205.201.128.1-205.201.143.255 but they're still being blocked.
    Any one got any suggestions on how I can get these emails to stop being blocked ?
    The fail reason says 'Reason: [{LRT={;{LED=550 4.3.2 QUEUE. TransportAgent; message deleted by...

  • Re: Date/Time config in Spiceworks Helpdesk... Help!

    Try this plugin as well.
    https://community.spiceworks.com/appcenter/app/plugin_1539

    Hello all!
    Does anyone know where I can make it so when I have an entry in our Helpdesk it won't say "15 days ago" or "8 days ago" and it will actually give me a date/time stamp? i.e. 06/23/15 Thanks in advanced spice heads!
    This topic first appeared in the Spiceworks Community

  • Do not respect security environnement and load images

    With Firefox 4.
    When loading into a securised website/environnement, that identify and blocks certain images as web bugs, then firefox 4 displays them.
    Other browsers respect the restriction of the environnement.
    Related to the question: problem when loading certain web sites.

    This article describes the hidden preference setting: http://kb.mozillazine.org/Permissions.default.image You could test that to see whether it does what you want.

  • Integrate Spiceworks' Helpdesk with Desktop Central?

    Workstation is a Dell Precision 7810. Dual monitor setup with two NVIDIA Quadro K620. Its a fairly well spec'd machine, running windows 7. Monitor 1 is 1920x1080@60hz 32bpp. Monitor 2 1680x1050, 59.88hz, 32bpp, both DVIThe UI is lagging noticeably. Exact issues are:When minimizing and restoring windows there is noticeable "jitter" and lagFlash video jitters, gets worse when flash is full screen.Actions like creating a new browser tab a noticeable pauseThings I've tried:Updated NVIDIA drivers (from NVIDIA).Dell Command Update, latest drivers on machine.Disabled hardware acceleration in flashUsed dell performance tuner, set profile to dell factory profile.Changed settings in NVIDIA Control: GPU dedicated to graphics tasks, Scaling OFF,

    My scan doesn't recognize the above device. If there is no SMNP support in the device, is there anything other than classifying it as a network device that I can do?Also, I have two devices running off of this device by its routerEthernet ports. One is a MS Vista PC, the other is a MS Win 8.1 device. Is it possible to scan through this router to get information about these more moderndevices? If so, how?Likewise, the router is also a wireless access point. I only connect one device to it via Wi-Fi. Can the inventory include information about the WAP?Below are some scan test results for the router.Thanks!Dave-------------------------------------------------------------------------------------------------D-Link DIR-615 Hardware version B2, Firmware 2.25WAN is Comcast Cable Modem RouterTrace Route(15:03:03)Tracing route to 10.1.10.9 over...

Maybe you are looking for

  • Screen not blanking properly (Backlight doesn't turn off)

    I've been facing a weird problem lately. Whenever I leave my laptop on for a while when I'm logged on in X (I use KDE), the screen turns off after 10 minutes. All well and good. But whenever the laptop idle when logged on to a virtual console, after

  • Sending PDF form directly to email

    Is it possible to send filled PDF form directly from Acrobat Pro or Reader to requested email by clicking the SEND button? Or does it always go via senders email application? What should be done to get it going directly?

  • Best Mouse for 9.2.2?

    I use 9.2.2 exclusively, and my Apple Optical Mouse just stopped working. I've tried a few cheap mice, but they all have low resolution. Could you please offer some recommendations regarding which mice work best with 9.2.2? Thanks for your time. J.C.

  • Error FND_WF_IN_PROGRESS_FOR_TXN while invoking workflow via OA Framework

    Hello, I am invoking a workflow from OA Framework page. Basically I am creating an entity and at the end of the entity creation, I am triggering workflow for its approval. It works first time and now I create a new entity and try to trigger approval,

  • Im trying to create a link within a report

    select se.SERVER_ID, se.SERVER_NAME, se.MODEL_NUMBER, se.SERVER_FUNCTION, se.OPERATING_SYSTEM, se.PROCESSORS, se.RAM, (select case when server_name in 'ni-cr-dev-dbs1'         then '<a href="Link' when server_name in name_of_document         then '<a