<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>troubleshooting Archives - Computer Services &amp; Solutions, INC.</title>
	<atom:link href="https://cssi.us/category/troubleshooting/feed/" rel="self" type="application/rss+xml" />
	<link>https://cssi.us/category/troubleshooting/</link>
	<description>431 S. Broadway Ave. Suite 222, Lexington, KY. (859) 226-9222</description>
	<lastBuildDate>Mon, 13 Jul 2020 17:02:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Fix For Ctrl Shift V to Move Outlook Emails Stopped Working</title>
		<link>https://cssi.us/fix-ctrl-shift-v-move-outlook-emails-stopped-working/</link>
		
		<dc:creator><![CDATA[Tyler]]></dc:creator>
		<pubDate>Wed, 18 Oct 2017 21:59:36 +0000</pubDate>
				<category><![CDATA[fixes]]></category>
		<category><![CDATA[troubleshooting]]></category>
		<guid isPermaLink="false">https://cssi.us/?p=372</guid>

					<description><![CDATA[<p>Today I ran into a small issue where I couldn&#8217;t use ctrl+shift+v to move emails. Instead of giving me the move dialog, I was getting a new email with pasted text in it. It turns out, this was because I recently installed, Clipdiary, a clipboard history utility for Windows. To fix this, go to File [&#8230;]</p>
<p>The post <a href="https://cssi.us/fix-ctrl-shift-v-move-outlook-emails-stopped-working/">Fix For Ctrl Shift V to Move Outlook Emails Stopped Working</a> appeared first on <a href="https://cssi.us">Computer Services &amp; Solutions, INC.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Today I ran into a small issue where I couldn&#8217;t use ctrl+shift+v to move emails. Instead of giving me the move dialog, I was getting a new email with pasted text in it.</p>
<p>It turns out, this was because I recently installed, Clipdiary, a clipboard history utility for Windows.</p>
<p>To fix this, go to File &#8211; Options &#8211; Hot Keys. Put a check next to &#8216;Win&#8217; on &#8216;Paste current clipboard contents as plain text&#8217;. As you can see, what you are doing is telling Clipdiary to not use Ctrl+Shift+V for pasting the clipboard contents as plain text (stealing the hotkey from Outlook), instead use Win+Ctrl+Shift+V.</p>
<p>The post <a href="https://cssi.us/fix-ctrl-shift-v-move-outlook-emails-stopped-working/">Fix For Ctrl Shift V to Move Outlook Emails Stopped Working</a> appeared first on <a href="https://cssi.us">Computer Services &amp; Solutions, INC.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Tracking Down Repeat Failed Login Attempts to Domain Controller</title>
		<link>https://cssi.us/tracking-down-repeat-failed-login-attempts-to-domain-controller/</link>
		
		<dc:creator><![CDATA[Tyler]]></dc:creator>
		<pubDate>Fri, 16 Jun 2017 16:08:14 +0000</pubDate>
				<category><![CDATA[troubleshooting]]></category>
		<guid isPermaLink="false">https://cssi.us/?p=279</guid>

					<description><![CDATA[<p>One of our clients kept getting repeat failed login attempts on their domain controller. Usually this is an issue with a port being open on the firewall and brute-force attacks being run to guess the password, but ports were closed on the firewall and it didn&#8217;t look like a dictionary attack. Instead, it looked like [&#8230;]</p>
<p>The post <a href="https://cssi.us/tracking-down-repeat-failed-login-attempts-to-domain-controller/">Tracking Down Repeat Failed Login Attempts to Domain Controller</a> appeared first on <a href="https://cssi.us">Computer Services &amp; Solutions, INC.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>One of our clients kept getting repeat failed login attempts on their domain controller. Usually this is an issue with a port being open on the firewall and brute-force attacks being run to guess the password, but ports were closed on the firewall and it didn&#8217;t look like a dictionary attack. Instead, it looked like something was running every 2 minutes, attempting to use the guest account.</p>
<p>The first thing we did was filter the security log in the Event Log by keyword: Audit Failure. This allowed us to see how often all the audit failures were. Conveniently, they were about every 2 minutes. (Convenient because we have a few chances to catch the culprit!) We could see that the source port was changing every time, adding complexity to the issue.</p>
<p><a href="https://cssi.us/wp-content/uploads/2017/06/auditfailure.png"><img data-tf-not-load="1" fetchpriority="high" loading="auto" decoding="auto" fetchpriority="high" decoding="async" class="size-full wp-image-280 aligncenter" src="https://cssi.us/wp-content/uploads/2017/06/auditfailure.png" alt="" width="573" height="381" /></a></p>
<p>The audit log provided the IP address of the workstation as well as the username that was trying to authenticate.</p>
<p>We were interested in what the hostname was of the workstation, so we ran <code>ping -a 192.168.10.15</code> and got the hostname. Now we know the PCs name and the account that is failing authentication. We have found the offender!</p>
<p>We used our remote support tools to connect to the PC, then wrote a script to monitor the port traffic. This script is just an infinite loop, dumping out the output of netstat -ano.</p>
<p><code>:loop<br />
netstat -ano &gt;&gt; ports.txt<br />
goto loop</code></p>
<p>We saved this as monitor.bat and ran on the offending machine. Then we went to the domain controller and watched for the event to happen. Once we had the Source Port from the new event, we went back to the offending machine, pressed Ctrl+C, terminated the script, and opened the ports.txt file. We were able to search the text file for the Source Port and get the Process ID of the offending process.</p>
<p><a href="https://cssi.us/wp-content/uploads/2017/06/processcapture.png"><img data-tf-not-load="1" decoding="async" class="size-full wp-image-281 aligncenter" src="https://cssi.us/wp-content/uploads/2017/06/processcapture.png" alt="" width="610" height="56" /></a></p>
<p>With this information, we were able to open a command prompt and find the offending process.</p>
<p><code>tasklist /v | findstr /i "54042"</code></p>
<p>From there we were able to make changes to the process to allow it to authenticate correctly, if necessary, or remove the process if not necessary.</p>
<p>The post <a href="https://cssi.us/tracking-down-repeat-failed-login-attempts-to-domain-controller/">Tracking Down Repeat Failed Login Attempts to Domain Controller</a> appeared first on <a href="https://cssi.us">Computer Services &amp; Solutions, INC.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
