CoNetrix is built on the principles of integrity, innovation, and initiative.

CoNetrix is a full service computer networking, security and compliance firm built on the principles of integrity, innovation, and initiative. We specifically serve financial institutions as well as enterprises requiring a high level of security in their operations.

BLOG

Tool to troubleshoot Windows Explorer crashes

9/28/2017

I have had the issue of Windows explorer crashing several times a day. All explorer windows, the desktop and task bar disappear then the desktop and task bar reappear after a few seconds. I did not nail down the specific culprit but used ShellExView (www.nirsoft.net/utils/shexview.html) to disable all non-Microsoft shell extentions. That made a significant difference and I haven't had explorer crash in the last few days. Of course, it could be a combination of shell extensions that will make it harder to identify. In the meantime, I will add an extension as I miss it and see if it destabilizes Windows explorer again.

BLOG

VMware ESX Server HP power management

9/28/2017

There are power management settings that should be checked when running ESX on HP Proliant G6 and above or Dell PowerEdge 11th and 12th Generation servers.  See VMware article for details: https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1018206‚Äč  The Proliant G8 that I examined having performance issues was set in the BIOS to use "HP Dynamic Power Savings mode" instead of "HP Static High Performance mode".  This can have an impact on virtual machines ability to utilize the CPU of the host.   This setting can be changed through iLO without the need to get into the BIOS directly to make the change.  It does not require a reboot of the ESX host to change the setting this way, which is even better.

BLOG

Removing domains from Barracuda Email Security Service

9/28/2017

I’ve been migrating Exchange customers from Barracuda ESS over the past few months and recently ran into a small issue. I had logged into the BESS portal one morning and decided to go ahead and start cleaning up some of the domains that were registered so that Barracuda would stop routing email for these customers.

BLOG

Data Breach at Equifax Effects Millions of U.S. Consumers

9/11/2017

The Equifax data breach announced yesterday potentially affects 143 million U.S. consumers and is one of the largest breaches of personal information. The following steps can be taken by consumers to help protect against fraud and identity theft: Additional details:

ARTICLE

Kittens and Yetis and Bears, Oh My! - Incident Response in a Bad Bad World

9/11/2017

It seems that every week a news story appears detailing new hacking activity originating from organized groups with interesting names such as Energetic Bear, Rocket Kitten, Crouching Yeti, Night Dragon and Sad Panda. While these names are colorful, the groups they are associated with are deadly serious. One might think that these groups are interested only in government or military secrets. However, businesses from all sectors are subject to attack. Successful compromises have been detected in areas such as power and water utilities, communications, and in business holding personal identifying information. The motivations behind these attack groups are tied to political, commercial, and security needs. When considering this, it becomes obvious that all businesses and many individuals have information that would be valuable to the groups. Making the problem more complex, many organizations do not realize they are compromised until they are notified by an external source, usually law enforcement.

ARTICLE

20,000 Leagues Under the BYOD

9/11/2017

You're standing on the edge and everyone is cheering you on! The waters look deep, blue and promising, far below. As you look around, everyone else seems to be taking the plunge, smart devices gripped tight, right into "Bring Your Own Device."

BLOG

Cisco ASA 5506x Switch Port Configuration with ASDM

9/1/2017

Beginning with ASA OS v9.7, the 5506-X has a new default configuration that allows the ports to be used as switchports, similar to how the 5505 models worked. The default configuration includes a Bridge Virtual Interface (BVI) that has ports G1/2 - G1/7 (6 ports) as members of the BVI. This will apply to models that ship with 9.7 code. However, if you upgrade a device to 9.7, you will have to manually create the BVI group (the upgrade itself does not do this).

ARTICLE

Mobile Device Management

9/1/2017

There was a time, seemingly not so long ago, where business cell phones had clunky keyboards, terrible screens, and limited every-day functionality outside of making calls and checking emails. The introduction of the iPhone in 2007 changed all of that, combining not only the abilities listed above but also a music player to drown out the cubicle noise in the office, simple games to keep a person distracted from actual productivity, and a decent digital camera which enabled users to fill their storage with photos of their food, children, grandchildren, and pets. While these new features were great for the average consumer and led to an increased adoption of smart phones, they created an additional headache for businesses with regard to balancing device security and user data on small, easily lost, and often personally-owned devices. Users began wanting access to their business email on these smart phones yet still have control over the devices themselves. This issue persists to this day, on phones as well as tablets, and it is imperative that controls are in place to ensure company data is kept safe.

NEWS

CoNetrix Launches tandem Mobile App

9/1/2017

Since 2009, tandem Business Continuity Plan (BCP) has provided financial institutions with an online platform for building and maintaining a compliant and disaster-ready business continuity plan. Now, the tandem App delivers the ability to access the BCP from any mobile device. The app provides easy access to download the full plan and any pertinent emergency checklists and instruction manuals designed by the institution. In addition to the downloadable documents, the app provides quick access to employee and vendor contact information right on the screen. The app also expands capabilities for emergency alerts as administrators can initiate alerts to contact employees via email, phone call, text, or a mobile notification within the app.

NEWS

CoNetrix Technology Launches New Network Threat Protection Service

9/1/2017

CoNetrix Technology, a division of CoNetrix, LLC, announced today the launch of a new managed security service: Network Threat Protection. This new service brings multiple layers of enterprise security into a cost-effective solution to provide broad protection for the IT environment. Network Threat Protection includes the following security layers:

BLOG

VMware MAC Address Conflict Alarm in vCenter 6.0

8/31/2017

After upgrading a customer to vCenter to 6.0, VMs that were being replicated with Veeam from one site to another started to issue an alarm for a "VM MAC Conflict". However, when I compared the MACs of the replicated VM and the original VM, they were unique. I had not upgraded the hosts at this point, only vCenter. Nothing had changed with Veeam, so this was a new issue as a result of the vCenter upgrade.

BLOG

Windows Update Error 80243004

8/30/2017

I was recently doing a maintenance window for a customer and had an issue with several of their servers giving me an Error Code 80243004 – Windows Update encountered an unknow error when I was trying to install updates.  After researching, I came across an article with a very simple and weird fix for the issue. 

Read News | Articles | Blog

CoNetrix maintains partnerships with leading technology vendors.

Microsoft
Cisco
Citrix
Barracuda
Dell
HP
Symantec
Veeam
VMWare
ZixCorp
Netapp
Fortinet