- Sign-up Now!
 - Current Issue
 - Edit Your Profile/Unsubscribe

Subscribe | Media Kit | About Us | All Issues | Subscriber Feedback | Contact Us | Privacy Statement
Sunbelt W2Knews™ Electronic Newsletter
The secret of those "who always seem to know" - Over 500,000 Readers!
Mon, May 22, 2000
W2K SP1 fixes over 300 bugs
  This issue of W2Knews™ contains:
* Welcome to new subscribers / New Book Table of Content
/ 2000 Target Awards
* W2K Disk Quotas compared to Third Party Tool Quotas
* W2K SP1 has about 300 bug fixes
* IBM comes out with ready-to-wear W2K Cluster
* Some email viruses spreading WITHOUT opening attachment
* New Tool To Automate Administration: OpalisRobot
* Hate coding? Tired of login-script debugging? Try this.
* Hot New Version of Sunbelt Domain Reporter does NTFS!
5. W2Knews 'FAVE' LINKS:
* NEW: This Week's 3 Cool HotLinks
* Remedial email attachment class 
7. THE NT/2000 STOCK WATCH - Friday May 19, 2000
Instructions on how to subscribe, sign off or change your address.

*******************SPONSOR: ST. BERNARD SOFTWARE **************** 
Did The Love Bug Steal Your Data?
The " I Love You " virus invaded systems and networks around the 
world, exposing priceless data to permanent corruption and elimi-
nation. St. Bernard Software's Open File ManagerTM is the only 
open file solution that guarantees 100% restoration and protection 
of critical data. Compatible with ALL backup packages, Open File 
Manager is the ultimate antidote for any computer virus.

Secure your data today at www.stbernard.com/index-sunbelt.html

**********************WHAT IS W2Knews?**************************

Sunbelt W2Knews (the original NTools E-News) is the World's first 
and largest E-Newsletter designed for NT/2000 System Admins that 
have the job to get and keep NT up & running in a production 
environment. Sunbelt launched this electronic newsletter early 1996. 
Every week we keep the Windows NT/2000 community informed and aware 
of new developments of NT and 3-rd party System Management Tools. 
You get hints and tips that will enable you to better utilize and 
understand Win NT/2000 and help to pass your Certification Exams.
Info and Stu's bio: http://www.sunbelt-software.com/w2knews.htm

Via (separate) NTools E-NewsFlashes we will send you important 
breaking news like new service packs, killer viruses, etc. Sunbelt 
Software is the first and largest provider worldwide of Third 
Party System Management Tools for Windows NT. Tell Your Friends!
All back issues are here, searchable and indexed on key words:


Hello NT/2000 Pros, 

If this is your first issue, welcome to the team! We have noticed
a lot of new people have signed up recently. Treat this as your
sample issue. You can unsubscribe at any time but you'd miss out
on some pretty good stuff!

My new book is getting closer by the day. It's just in time for
all of you that need to get your wits wrapped around Windows 2000. 
We have looked very hard at what data you REALLY need to get W2K 
up and running, and included all that crucial info in _one_ what 
Amazon already describes as a 'must-have' reference book. 
I have included a sneak peak at the 'Windows 2000 Administrator's
Black Book' table of content. You can check it out here!

The 2000 W2Knews Target Awards are going to be MUCH more involved
than last year. You will be able to submit and vote for your fave
tools, and it will stay online the whole year, so you can see which
utilities are voted as BEST OF BREED by your NT/2000 colleagues.
It's going to be open, honest, and revealing. May the best tool
win! I will let you know shortly where to vote.

Warm regards,

Stu Sjouwerman
Email me with feedback at: [email protected]

*****************SPONSOR: CRUEL WORLD**************************
Cruel World, an Internet recruitment service for developers, is
giving away the wireless Palm VII. Let us find you that perfect
match -a cool new project, a new boss, more money. We?re
totally free, totally confidential, and just for developers.
Upgrade your job and your PDA. Join now for a chance to win!



* W2K Disk Quotas compared to Third Party Tool Quotas

If you are looking at implementing Disk Quotas (a very healthy 
idea) and are comparing third party tools against the native 
features of Windows 2000, it pays to know the specific W2K 
capabilities. So, we ran some tests our internal machines with 
Windows 2000 Advanced Server and Windows 2000 Professional. Here 
is what we found.

First off, you can only set quotas on partitions and on an 
individual user basis.

In Windows 2000 you have the option to "deny disk space to 
users exceeding quota limit" This in essence represents a 
"hard quota" that can not be exceeded. You can elect not to 
check this option, in which case you will have implemented 
"soft quotas" that _can_ be exceeded. 

You can create a default quota limit for new users on the volume 
of any size limit. This is very similar to "learn mode" in 
Quota Advisor, which prevents you from having to keep assigning 
new quotas to new users storing data on that volume in the future.

You can set a warning level of any size limit for the default 
quota. So, for example, you might make the default quota 100MB, 
and you set up one warning level to 85MB.

You have the option to log an event when a user exceeds their 
quota limit. You have the option to log an event when a user 
exceeds their warning level.

For any partition, if you go to Properties, Quota tab, there is 
a Quota Entries button that will open a window called Quota 
Entries. This window looks very much like the Disk Advisor 
window that lists all users who have quotas on that partition, 
the amount of space they are currently using, their quota limit, 
their warning level, and their percent used. You can right-click 
on any item on the list to either delete it or to change its

Quotas in Windows 2000 do not apply to Administrators, no matter 
what your settings are. On a Windows 2000 Professional computer, 
when a User tries to copy data to his home directory on the Server, 
he will get the following message if he exceeds his limit:

"Cannot copy The_Monkees - Last_Train_to_Clarksville: There is 
not enough free disk space. Delete one or more files to free disk 
space, and then try again."

Having elected to generate event log entries for when a user 
exceeds their quota, you will find in the System log an 'info' 
event regarding "ntfs" that simply states in the description 
field "a user hit their volume limit on volume D:" The Username 
will be listed above the description field.

When a user exceeds his warning threshold, he does not receive a 
message on his computer. Thus he will never know he is over his 
limit until he reaches it and is rejected. These features are 
identical on both W2K Advanced Server and W2K Pro.

So, if you wants to know what value is added by third party tools,
like Quota Advisor or Storage Central, the two key words here are
more CONTROL and GRANULARITY regarding disk management. Quota 
Advisor provides 5 threshold levels where Users can be notified.
Windows 2000 has none. (I did not receive any notification when 
I exceeded the warning threshold set on my home directory on 
the Windows 2000 Server)

Quota Advisor allows you to set distinct limits for a User on 
multiple folders on the same partition. Windows 2000 does not 
allow quotas to be set on individual folders. That is the classic 
example of Quota Advisor providing granularity of disk management.

Quota Advisor's Learn Mode can be applied to any single object 
in the directory. In Windows 2000, this functionality can only 
be set at the partition level. Now you'll understand why Micro-
soft Redmond (and last week Ford Motor) chose Quota Advisor 
for their worldwide user disk space quota management. Check the
specs at: http://www.sunbelt-software.com/product.cfm?id=423


* W2K SP1 has about 300 bug fixes

Last week we reported that Microsoft sent SP1 for W2K to beta.
If everything goes right, you should see it in June. SP1 contains
all kinds of bug fixes, Big Bugs and small critters. Some of the
little ones only affect a small language area like Hungary. But
some other 'larger' bugs fix problems like using Iomega drives or
memory leaks and problems that cause applications to slow down. 
If you were waiting for SP1 before you would touch W2K, you were
justified, but this amount of fixes is not an awful lot for a
version 1.0. W2K is as good as they say it is.

* IBM comes out with ready-to-wear W2K Cluster

IBM just intro'd a pair W2K Advanced Server powered two-node 
Netfinity clusters. They call these combo's Netfinity HA 
Cluster Servers and they combine all the elements needed 
for a complete Win2K failover cluster. IBM claims that you
can unpack the boxes and within minutes you can have them up 
and running. They are the first Microsoft OEM that comes out
using Win2K Advanced Server for their new clusters. You can 
get them in tower or rack-mount models for a cost that starts
at $23,999 and $19,499. IBM said that these figures are 20% 
less if you would buy all the pieces separately. 


* Some email viruses spreading WITHOUT opening attachment

I could not trace who sent me this, but it's a nasty one that 
I received last week, so I thought I'd make you aware of it. 
Systems running Internet Explorer (IE) version 5.0 and/or MS 
Office 2000 are vulnerable to some virus attacks using most 
email systems, even if the email recipient opens no attachments. 

You don't even have to use IE; just have it installed with the 
default security settings. If you have not closed the hole, 
you can receive viruses (and spread them) by viewing or 
previewing malicious email without opening any attachment, or 
by visiting a malicious web site. The problem is caused by a 
programming bug in an Internet Explorer ActiveX control called

This is by far the fastest growing virus distribution problem 
and ripe for a hugely destructive event - at least as large as 
the ILOVEYOU virus. Updating your virus detection software,
while important, is not an effective solution for this problem. 
You must also close the hole. The hole can be closed in five 
minutes or less using tools available at Microsoft's security site:
The correction script may be run directly from:

Editor's Note: Thanks to Jimmy Kuo of Network Associates and Nick
FitzGerald of Computer Virus Consulting Ltd. for raising the 
visibility of this dangerous problem.


* New Tool To Automate Administration: OpalisRobot

To be honest, OpalisRobot is not new. It's been around for quite
a while already and last year was chosen as a TARGET AWARD winner.
We took our time selecting it for our product line-up because we
were waiting for a few features that made it unbeatable in our
eyes. They are here now so if you read on you will find the reason 
Opalis made it into the Sunbelt list:

- It's a category of it's own, combining Job Scheduling with
Monitoring and Proactive Automation. You can specify events,
and what needs to be done when that event happens. A '24/7 watch
dog' that can correct problems.

- A lot of people use it for Job Scheduling based on dynamic
events. Just an example. A file gets FTP'd into a directory
at 03:00am. Automatically a job starts to process that file 
with an app you specified. The output file gets FTP'd back
to where it came from. You get an email the process completed
while you continue to snooze comfortably.

- Want to make sure that critical apps stay up? You can monitor
a service. Service disappears? Opalis Robot will try to start
it up n-times. Still not up? Opalis will reboot the server
and continue to look for the service after the reboot. Still
not up? It will send an email, page or call you with a wave
file message, and allow you to initiate corrective action from
your remote location. Pretty darn cool.

- Want to do sequenced job streaming with dependencies and
queueing? Can do. Want to do string compare on file names or
file content? No worries. Want to do a mass-email to your
customers but also include an attachment? It will do it.

- Want to monitor the resources a particular process takes
and if it's running away automatically kill it? Done. Want
to set triggers for utilization 'red zones'? About a minute
and they are up.

As you can see, it's practically impossible to tell you what
this puppy can do. You need to play with it and teach it all
your tricks. Click your way to this page with product specs
and let your imagination take over. See you at the beech! 


* Hate coding? Tired of login-script debugging? Try this.

Let me ask you some questions:

- Are you still modifying the registry of new computers manually? 
- Still installing the latest service packs by hand? 
- Still creating Outlook profiles manually? 
- Would you like to know who logged on to what station, with 
what IP address, privilege level and when? 
- Frustrated by trying to create a real "logon script" with 
a myriad of MS-DOS batch file commands? 
- Sick and tired of login-script modifications and debugging?

We have found ScriptLogic to be extremely popular in this area.
As a matter of fact, this tool is the world's best selling
enterprise logon-script generator. (Version 3 that is now
in Beta even supports W2K's Active Directory)

But what you can play with right now is manipulating secure 
sections of the registry on NT/2000 clients, even if the user 
logging on is not an administrator of the local machine. This 
includes Policies.

You have the ability to display your own company's bitmap 
logo in place of the default Inteletek ScriptLogic splash 
screen during the logon process, and you can redirect shell 
folders such as bookmarks, desktops, start menus, etc. to 
network shares or user home directories. All without coding
a single line. 

Looking for a logon-script time saver? Mouse your way over here:

* Hot New Version of Sunbelt Domain Reporter does NTFS!

As I said earlier, Sunbelt Domain Reporter is a really important
element of your W2K readiness. The new V2.6 has a major new feature:
NTFS permissions reporting -- extremely powerful.

Sunbelt Domain Reporter version 2.6 enables you to efficiently 
collect information about your domains and their contents. Armed 
with this data, you can plan for transitions to new domain
structures and W2K. And on a day to day basis, domain object and 
file permissions reports ensure adherence to your corporate 
standards and security policies.

The key additions to SDR in version 2.6 are:
* NT File System Permissions Reporting
* Offline Reporting on Collected Data

- Why is NT File System permissions reporting important?

Preparing for Domain Consolidation and/or Windows 2000 Migration
your understanding of your file system permissions is a key
element of the planning process for domain consolidation and 
migration to W2K. There can be a direct correlation between file 
system permissions and decisions concerning what groups of users 
to migrate together. 

Since permissions updating is often a key (and very time consuming) 
activity in consolidations and migrations, having access to 
consolidated and accurate information on file permissions will
simply bring you significant time savings.

- Enforcement of corporate permissions standards 

File system permissions reporting will greatly help you enforcing
corporate policies. For example, organizations often put into place 
standard Access Control Lists to be applied across the organization. 
NTFS reporting allows you to determine that these are in fact being 
applied correctly - and to identify where they are not.

- Security auditing 

Security auditing is a major concern in many organizations. Security 
of data contained in NT file systems can be challenging to evaluate 
as there simply are no native tools that can report on file system 
permissions. SDR's NTFS reporting allows you to get specific info
about where a particular user or users have been given explicit 
access - something which is not normally done outside of users' 
personal directories. 

Another security-related use pertains to employees leaving an 
organization - where did that employee have access and what data
might they have taken when they left?

If you use Sunbelt Domain reporter to assess company networks, the 
following point is important: Offline Reporting on Collected Data.

Offline Reporting (enabled by offline Scopes) is a feature that will
be very useful if you do network assessments as part of an inside
or perhaps outside service offering. You want to be able to review 
the data you have collected after leaving the customer's site. Using 
"create offline scopes" in Scope Manager, it is now possible to 
create a stored copy of all the network objects to permit offline 
viewing of collected historical data.

If you have already implemented SDR, you will now see the bigtime
benefits of having it there. Call your Rep for your update. If you 
want to evaluate SDR, go to our high speed FTP site and download
the 27Meg. I tried it just a moment ago and obtained an average of 
90 KB/sec so that was pretty decent. On the product page we have
release notes with ALL the improvements. Click here:


5. W2Knews 'FAVE' LINKS: May 22, 2000

Very useful site for MS SQL Server users. Neil Pike and Michael
Hotek have done excellent work. http://www.mssqlserver.com/faq/
BestSeller NetApplet of the week: User Security Audit. Check it
out at: http://www.sunbelt-software.com/product.cfm?id=860
Subscription Management, Archives and all Back Issues of all lists 
and Newsletters http://lyris.sunbelt-software.com/scripts/lyris.pl

6. HINTS AND TIPS: Remedial email attachment class ;-)

User: I need help with this attachment. It won't open.
Helpdesk: Well what is the attachment?
User: I don't know, I haven't been able to open it to find out.
Helpdesk: Well what is it called? What is the extension?
User: It ends in vbs.
Helpdesk: Great. Press delete and attend our remedial email 
attachment class held each Friday out behind the building, near 
the guillotine. Thank you for shopping at IT.

(William Lefkovics wrote this in the NTSYSADMIN list, and it 
expresses the sentiment so well that I just _had_ to include it)

7. THE NT/2000 STOCK WATCH - Friday May 19, 2000. NetIQ up 15% (!)
this week after merger with Mission Critical completes.

52 WK 52 WK P/E WEEK
Advanced Micro Devices... 83 13/16 92 7/8 15 5/8 60 -2.1%
BMC Software............. 42 1/2 86 5/8 36 43 -1.0%
BindView Development Corp 7 3/16 45 3/4 7 3/8 -8.7%
Cisco Systems............ 53 7/16 82 26 -10.8%
Citrix Systems Inc....... 48 1/16 122 5/16 21 7/8 73 -8.6%
Compaq Computer.......... 27 7/16 34 18 1/4 74 +0.2%
Computer Associates...... 49 7/16 79 7/16 40 15/16 40 -0.1%
Data Return Corporation.. 20 94 1/4 13 3/4 -12.5%
Dell Computer............ 46 15/16 59 3/4 31 3/8 73 -5.8%
Electronic Data Systems C 61 3/16 76 11/16 47 7/8 41 -0.1%
Gateway Inc.............. 49 1/4 84 28 3/8 35 -7.7%
Hewlett Packard Co....... 126 3/16 156 67 39 -4.0%
Intel Corp............... 117 7/8 145 3/8 50 1/8 51 +2.5%
Intergraph Corp.......... 5 1/2 10 1/4 3 3/16 -20.7%
International Business Ma 106 5/8 139 3/16 89 3/4 26 +2.0%
Legato Systems Inc....... 11 7/8 82 1/2 9 1/4 -4.0%
Micron Electronics Inc... 9 33/64 20 11/16 9 22 -5.8%
Microsoft Corp........... 65 1/16 119 15/16 60 38 -5.4%
NCR Corp................. 37 52 5/8 26 11/16 11 +2.9%
NetIQ Corporation........ 41 1/8 81 1/2 14 3/4 +15.0%
Network Associates Inc... 21 3/16 37 3/16 12 5/8 -10.0%
Novell Inc............... 9 1/16 44 9/16 9 9/16 15 -10.2%
Oracle Corp.............. 70 1/16 90 11 1/4 -5.5%
Qualcomm Incorporated.... 89 1/4 200 21 1/2 -8.9%
Seagate Technology....... 51 7/16 76 25 1/8 12 +14.1%
Silicon Graphics......... 6 7/8 18 7/8 6 1/4 +6.8%
Sun Microsystems Inc..... 77 1/4 106 3/4 27 84 -5.2%
Sybase Inc............... 20 15/16 31 8 25/64 28 -10.1%
Symantec Corp............ 62 5/16 81 5/8 19 5/8 24 +10.1%
Unisys Corp.............. 24 1/4 49 11/16 19 1/2 15 +0.7%
Veritas Software Corp.... 102 1/8 174 16 3/4 +14.1%
Dow Jones 30 Industrials. 10,626.85 +0.1%


8. "HOW TO USE THE MAILING LIST" Instructions on how to subscribe, 
sign off or change your email address

TO SUBSCRIBE TO THE LIST (Tell your friends!) 

Click: http://lyris.sunbelt-software.com/scripts/lyris.pl?join=nt-list
and fill out the form, simple & easy: 1 minute work.

Or by email, send a blank message to the following address:
[email protected]



1) The Web Way:
choose the NT-List, use your email address that is at 
the bottom of each newsletter and leave the list via 
the web interface.

2) The Email Way: Simply follow the personalized 
instructions at the very end of this newsletter.


First unsubscribe and then resubscribe as per the
procedure above.



On the World Wide Web point your browser to:

For the newsletter and our website:

For Tech Support on Sunbelt products mentioned:

Email for US sales information to:
[email protected]
Email for US Tech support to:
[email protected]
Email to the US Editor:
[email protected]

Email for European Sales to:
[email protected]
Email for European Tech support to:
[email protected]

At the time of this newsletter's release, all links were 
checked to verify their accuracy and validity. However, 
due to the ever changing pages of various sites, some links 
may later prove to be invalid. We regret any inconvenience 
should you be unable to open any of these links.

Things Our Lawyers Make Us Say:

This document is provided for informational purposes only. 
The information contained in this document represents the
current view of Sunbelt Software Distribution on the issues
discussed as of the date of publication. Because Sunbelt
must respond to changes in market conditions, it should not
be interpreted to be a commitment on the part of Sunbelt
and Sunbelt cannot guarantee the accuracy of any informa-
tion presented after the date of publication.


The user assumes the entire risk as to the accuracy and the
use of this document. This document may be copied and
distributed subject to the following conditions: 1) All text
must be copied without modification and all pages must be
included; 2) All copies must contain Sunbelt's copyright
notice and any other notices provided therein; and 3) This
document may not be distributed for profit. All trademarks
acknowledged. Copyright Sunbelt Software Distribution, Inc.

(email me with feedback: [email protected])