-
WSTinto Tech
AskWoody LoungerIn addition to what Paul says, remember that you need to be on Ethernet, not on a wireless connection to join the domain.
Just a guess here, but many windows 8 (.1) Pro machines are likely to be laptops or tablets and could be trying to connect over wfi.
Win8(.1) Pro does connect just the same as Win 7, Vista and XP etc. I joined a Win 8.1 Surface Pro2 just a week or two ago to our domain. We use an USB to Ethernet adapter to make sure they have a wired connection first then join.
Please keep us updated – I’m interested to find out what your solution might be.
-
WSTinto Tech
AskWoody LoungerDo you still run EAM? EAM provides protection against CryptoLocker, through it’s behavior detection feature, so you’d be safe just from using it, anyhow :).
Actually Rui, you have got me thinking now. Due the change of circumstances that I referred to in another place a few weeks ago, I no longer need to run Virtual Box at home. If I must have access to the platforms that my VM’s supported, I have plenty of other resources available to me elsewhere.
So….maybe, it’s time for me to revisit Online Armor + EAM while at home.
-
WSTinto Tech
AskWoody LoungerI think it’s a balancing act Rui.
As you may recall, some time ago, I ran Online Armor in conjunction with Emsisoft Antimalware and was very impressed with them. Unfortunately, I then started to suffer from BSOD’s triggered by the incompatibility of Online Armor and Virtual Box, which I needed to run for other purposes. It resulted in me having to remove Online Armor.
If I had Online Armor still installed on systems at home, I would be quite happy that the HIPS would give me measures needed to prevent CL, but for the reasons above I can’t run them, so I need extra layers. My children would not know how to react, so they also get additional layers of protection too.
At work, it’s a different story. The effort to configure an interactive HIPS in a commercial environment coupled with the inability of non technical staff, who are under pressure to get their work done, would result in simply clicking the accept button when whichever HIPS tool used requests permission. Yes, I agree people shouldn’t click, but it’s really hard to get the message across and people are human after all. I would like to lock down opportunities for people to make mistakes, but to a certain extent, I’m prevented from doing so.
So, at work, we do have HIPS in our Endpoint Security, but it’s silent. I’ve also deployed additional software restriction policies, by group policy, over and above those required to meet company operating policies and receive automated emails through task scheduler if somebody tries to do something they shouldn’t.
I do get occasional problems with restrictions being triggered and can sympathise when bobprimak asks why does Windows allow execution of apps from %appdata% with very little security requirements by default. It’s one of the biggest and most obvious differences between Windows and other families of Operating Systems. In fairness to Microsoft, it stems from historical configurations of their OS that wanted to be easy to use, but in so doing left gaping holes that have now for the most part been plugged. But the legacy continues: why does some software want to run from places that it shouldn’t? It would be nice to say “ban everything from running from there”, but the world turns to a different tune.
In my view HIPS is the go to solution for the home user if they are competent to use it proactively. Failing that something like the Crypto Prevent tool is a useful addition…..but at work, it’s not so quite so straightforward and, yes, I worry a little. :huh:
-
WSTinto Tech
AskWoody LoungerDo you mean this advice perchance
Read through that thread from start to finsih to refresh the memory.
What you need to do is identify the index number of the adapter you wish to enable and disable, then put that index number in to the wmi command inside the batch files previously created.
So, to fix the batch files for the new adapter:
-
[*]Click Start. Enter “CMD” (without the quotes) in the Search Program and Files box
[*]Right Click on the CMD prompt that appears at the top of the menu and select Run As Administrator
[*]In the command window that opens enter the following code: “wmic nic get name, index” Without the quotesTake a note of the index number of the network port you want to enable and disable. Last time it was 7, but this time it maybe something different.
Now you need to edit the batch files to update them with that index number.
Copy the two batch files to somewhere else to act as a backup first.
Next, Right click on the Internet off.bat file and choose edit. This will open notepad and allow you to edit the file. Find the line that says “wmic path win32_networkadapter where index=XX call disable” Replace XX with the index number you just noted above
Close Notepad and choose save.
Then, Right click on the Internet on.bat file and choose edit. Find the line that says “wmic path win32_networkadapter where index=XX call enable” Replace XX with the index number you just noted above.
Close Notepad and choose save.
If you have correctly identified the adapter the updated batch files will enable and disable correctly again.
-
WSTinto Tech
AskWoody LoungerIt’s not the desktop Outlook program, but the built in Android email app connects just fine to Exchange using active sync and integrates with Contacts & Calendar too.
-
WSTinto Tech
AskWoody LoungerI suspect the PC shop you took the problem to may be being a little short with the detail. Rather than needing a CGA monitor, my guess is that the CGA and EGCVGA drivers will not work with a modern motherboard equipped with an on-board gfx controller or a pci-e based card. Finding an old monitor is unlikely to fix the problem.
So, what to do? Well, although I don’t use this, I have heard good stories about DOSBox, which comes with it’s own graphics rendering engine and may display the graphs that you need.
-
WSTinto Tech
AskWoody LoungerI think there is more to your requirement than in your original request and it sounds a bit complicated the way you intend to do it. As Paut T suggested a VPN would not know how to route outgoing connections to hosts over the internet.
If your customer requires to track, monitor, or control his user’s internet access, then a VPN is not the way to do it. A VPN will provide secure point to point communications. This can be made anonymous at the far end and is sometimes used to transit national boundaries where restrictions would otherwise prohibit. But a VPN does not in itself control, log or otherwise monitor traffic. To do that you need a Proxy. In fact, reading between the lines, I think your dialer is in part a Proxy service, but not one that we might describe as normal.
I recommend that you deploy a full proxy server. Have your users authenticate against that Proxy Server using Active Directory – no additional authentication, just the single sign on in AD. The proxy server can be configured to log, monitor or control users actions in pretty much any way you wish. It can then also dial out the http requests over a VPN service if you need that secure point to point or anonymous connection.
The VPN forms part of the network connection operating at Layer 3 while the Proxy implements your control, monitoring and logging at the transport Layer 4.
-
WSTinto Tech
AskWoody LoungerIt’s almost impossible to do something wrong with CryptoPrevent; one click to apply.
CryptoPrevent includes an optional Whitelist Editor which makes it very easy.
CrytoPrevent includes a single-click “Undo”.
Post #11 mentioned that “Many legitimate programs use local and roaming appdata locations for executables, including lots of Google programs (such as chrome and numerous update files).”. I’ve found that many Sysinternals and Nirsoft utilities do the same (perhaps just the portable versions).
Bruce
Thanks Bruce,
I do not use Crypto Prevent, preferring to edit the Software Restriction policies myself and distribute via GPO. I’ve only come across two user applications in my deployment that have had an issue: Spotify (which the user shouldn’t have been using anyway) and Foxit Reader Updater, which was easily added to my whitelists. I’ve not had any problems with Sysinternals since my deployment (I use various tools from the suite every day); and haven’t had need to use any Nirsoft utilities since deployment, but will watch out for it.
I did encounter an issue installing MS Office on a new setup, but rather than set a whitelist entry on my DC and force a GPO update, I cheated and logged onto a local account on the machine, installed Office and then returned to the domain login.
However, bobrobert should not have had any issue removing or reversing the Software Restriction Policies. Based on your comments, if he was using Crypto Prevent, it should simple process. If manually setting Software Restriction Policies, just remove the policy setting and reboot.
[EDIT]
Curously enough, throughout October we had numerous (dozens and dozens, if not into the hundreds) of invoice-12345.pdf.exe attachments arrive by email. All were caught by our Antivirus (though I don’t want to rely on that in the future). Since the beginning of the first week in November, we have had none, and our background rate of spam has also reduced too. Anecdotal, perhaps, but I wonder if it has either gone to ground, or is being more actively being filtered by service providers / law enforcement.
-
WSTinto Tech
AskWoody LoungerActually I have a VPN dialler that as soon as user log-ins into his/her machine dial a VPN connection for internet access.
You have a somewhat unusual configuration. No doubt there is a very valid reason for this configuration, but it is difficult in this circumstance to answer without understanding the reasons reasons why you need a VPN for internet access for all users.
You do not describe the VPN dialler, but often these tools will have settings to route internet traffic automatically.
Alternatively you could deploy an on-site proxy server which manages all internet traffic: it could even direct this traffic over a VPN if needed. This provides a single point for configuration as Paul T suggested.
Failing that, setting a per computer static route in the AD Computer logon script should meet the requirement, but that may have unwanted implications for the reasons why you need VPN access for internet traffic.
-
WSTinto Tech
AskWoody LoungerThe incoming email will be queued by the originating servers. Between 48 to 72 hours is typical before expiry of the message. If the originating server is configured normally, the sender will receive a non-delivery notice if the message fails to be delivered to the recipient server due to it being offline.
Google, or other 3rd party systems (e.g. Exchange Online) can be used to provide high availability alternatives to an onsite Exchange server, or as a fall-back. There would be costs associated and you would also need to adjust the MX records in your DNS.
-
WSTinto Tech
AskWoody LoungerA word of warning. I followed the advice about local security policy & Software Restrictions Policies and everything was fine until I downloaded a program which wouldn’t launch. When I “tried” to reverse the restrictions Windows wouldn’t load and I was left with a blank desktop. Obviously I did something wrong. Eventually I restored my system. Not for the faint hearted.
At a guess, you used the CryptoPrevent tool from earlier links and have a “home” (i.e. not a -pro) version of Windows. That may make it much more difficult to add whitelisted programs to the software restriction policies because you do not have the gpmc console. I presume reversal of the software restriction policies on a “home” version involves editing the registry, which certainly can lead to serious problems if not performed correctly.
If you do have Pro or above it’s a fairly straightforward task to add a whitelisted application. The Software Restriction Policies are perhaps buried deep for those unfamiliar with gpmc, but not overly complex to add once the correct policy is located.
However, consider that software you are trying to run is attempting to execute from within the user profile. There should be very few reasons for an application to do so; and that should trigger questions about the software and its developers.
-
WSTinto Tech
AskWoody LoungerYou can use your Logon scripts.
If you want specific users to have certain static routes configured, you could call a batch or powershell script from within the logon scripts. However, I think this would need local admin privileges for the user account.
If you want specific machines to have static routes, you could configure that on the computer account logon rather than the user account. This would use the System account and not require elevated user permissions.
I general, allowing users to add or modify static routes is a potentially dangerous thing to do for the security and health of your network: if you need static routes, I think it would be preferrable to configure it on the computer account rather than for the user.
-
WSTinto Tech
AskWoody LoungerNovember 7, 2013 at 5:33 pm in reply to: Significant difference between PCs and internet Download speeds #1421789DSL provider has a direct download file off their server. http://support.hickorytech.net/myspeed/
I’ve got Ubuntu installed as a dual boot option on the desktop; I’ll give it a shot.
That site appears to measure reasonably accurately on my system, though it might be better to use a speed testing service that does not require java to be enabled in the browser (but that’s a different story!).
If you have Ubuntu installed as dual boot, it’s even better: use the same hardware, but an independent OS and compare the throughput. If the same slow speeds, you have a hardware issue; if better on Ubuntu there is a problem with the configuration of Win7. Think about packet sizes and mtu settings on the NIC on the bad machine and compare to those on the good machines.
-
WSTinto Tech
AskWoody LoungerNovember 7, 2013 at 4:54 pm in reply to: Significant difference between PCs and internet Download speeds #1421779How are you measuring download speeds? Is this a valid measurement or an artefact of the measurement technique?
One way to test throughput speeds is as follows:
-
[*]Get rid of any 3rd party download tools.
[*]Transfer a large file via an http get request directly from a webserver.
[*]Time the download accurately and calculate true download speed.
[*]Do this on all three machines and compare.I suggest using something like a Linux distro download to use as the seed for the large download file: Try this one, which should be 708 MB
-
WSTinto Tech
AskWoody LoungerNovember 5, 2013 at 4:12 pm in reply to: Network/Internet connectivity and System Create/Restore from System image #1421397I think it will be difficult to say with certainty why it is working now, but any tweaking of the registry to change or delete the NETBIOS name or other entries could have changed the MAC address and consequently, with the passage of time, updated the ARP cache in the router.
With a new MAC address and a flushed ARP cache it would work.
I’m quite willing to accept that this explanation could turn out be a complete red herring and that there may be another reason, but a cloned MAC address and ARP cache is where I would start.
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Woody
by
Scott
8 hours, 18 minutes ago -
24H2 has suppressed my favoured spider
by
Davidhs
8 hours, 20 minutes ago -
GeForce RTX 5060 in certain motherboards could experience blank screens
by
Alex5723
22 hours, 31 minutes ago -
MS Office 365 Home on MAC
by
MickIver
16 hours, 20 minutes ago -
Google’s Veo3 video generator. Before you ask: yes, everything is AI here
by
Alex5723
1 day, 12 hours ago -
Flash Drive Eject Error for Still In Use
by
J9438
1 day, 14 hours ago -
Windows 11 Insider Preview build 27863 released to Canary
by
joep517
2 days, 7 hours ago -
Windows 11 Insider Preview build 26120.4161 (24H2) released to BETA
by
joep517
2 days, 7 hours ago -
AI model turns to blackmail when engineers try to take it offline
by
Cybertooth
1 day, 11 hours ago -
Migrate off MS365 to Apple Products
by
dmt_3904
1 day, 11 hours ago -
Login screen icon
by
CWBillow
1 day, 2 hours ago -
AI coming to everything
by
Susan Bradley
11 hours, 37 minutes ago -
Mozilla : Pocket shuts down July 8, 2025, Fakespot shuts down on July 1, 2025
by
Alex5723
2 days, 23 hours ago -
No Screen TurnOff???
by
CWBillow
2 days, 23 hours ago -
Identify a dynamic range to then be used in another formula
by
BigDaddy07
3 days ago -
InfoStealer Malware Data Breach Exposed 184 Million Logins and Passwords
by
Alex5723
3 days, 11 hours ago -
How well does your browser block trackers?
by
n0ads
2 days, 21 hours ago -
You can’t handle me
by
Susan Bradley
1 hour, 2 minutes ago -
Chrome Can Now Change Your Weak Passwords for You
by
Alex5723
2 days, 14 hours ago -
Microsoft: Over 394,000 Windows PCs infected by Lumma malware, affects Chrome..
by
Alex5723
3 days, 22 hours ago -
Signal vs Microsoft’s Recall ; By Default, Signal Doesn’t Recall
by
Alex5723
3 days, 2 hours ago -
Internet Archive : This is where all of The Internet is stored
by
Alex5723
3 days, 23 hours ago -
iPhone 7 Plus and the iPhone 8 on Vantage list
by
Alex5723
3 days, 23 hours ago -
Lumma malware takedown
by
EyesOnWindows
3 days, 11 hours ago -
“kill switches” found in Chinese made power inverters
by
Alex5723
4 days, 8 hours ago -
Windows 11 – InControl vs pausing Windows updates
by
Kathy Stevens
4 days, 8 hours ago -
Meet Gemini in Chrome
by
Alex5723
4 days, 12 hours ago -
DuckDuckGo’s Duck.ai added GPT-4o mini
by
Alex5723
4 days, 12 hours ago -
Trump signs Take It Down Act
by
Alex5723
4 days, 20 hours ago -
Do you have a maintenance window?
by
Susan Bradley
3 days, 1 hour ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.