<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; GFI Fixes It</title>
	<atom:link href="http://www.gfi.com/blog/category/tttm/gfi-fixes-it/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 16:51:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>How to Prevent Users from Changing GFI WebMonitor® Proxy Settings in Firefox® Using Group Policies</title>
		<link>http://www.gfi.com/blog/how-to-prevent-users-from-changing-gfi-webmonitor-proxy-settings-in-firefox-using-group-policies/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-prevent-users-from-changing-gfi-webmonitor-proxy-settings-in-firefox-using-group-policies</link>
		<comments>http://www.gfi.com/blog/how-to-prevent-users-from-changing-gfi-webmonitor-proxy-settings-in-firefox-using-group-policies/#comments</comments>
		<pubDate>Tue, 23 Apr 2013 16:18:24 +0000</pubDate>
		<dc:creator>Ben Vincenti</dc:creator>
				<category><![CDATA[GFI Fixes It]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[Changing GFI WebMonitor® Proxy Settings in Firefox]]></category>
		<category><![CDATA[Firefox]]></category>
		<category><![CDATA[Firefox proxy settings]]></category>
		<category><![CDATA[FirefoxADM]]></category>
		<category><![CDATA[GFI WebMonitor® Proxy Settings]]></category>
		<category><![CDATA[GPO]]></category>
		<category><![CDATA[IE]]></category>
		<category><![CDATA[Internet Explorer]]></category>
		<category><![CDATA[Microsoft Windows]]></category>
		<category><![CDATA[Mozilla Firefox]]></category>
		<category><![CDATA[WebMonitor]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10473</guid>
		<description><![CDATA[If you’re in an environment where users are allowed to use browsers other than the default Internet Explorer (IE), you should know that these programs will use settings outside of the Microsoft defaults. Employees using other browsers will also need &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/04/WebMonitor-Firefox2.jpg"><img class="alignright  wp-image-10475" style="margin: 10px; border: 0px solid black;" alt="WebMonitor Firefox2" src="http://www.gfi.com/blog/wp-content/uploads/2013/04/WebMonitor-Firefox2-300x227.jpg" width="240" height="182" /></a><br />
If you’re in an environment where users are allowed to use browsers other than the default Internet Explorer (IE), you should know that these programs will use settings outside of the Microsoft defaults. Employees using other browsers will also need to have all their traffic sent through <a href="http://www.gfi.com/internet-monitoring-software?adv=13558&amp;loc=14">GFI WebMonitor</a>. In this post we’ll go through the procedure needed to ensure employees don’t get around security policies when using Firefox.<span id="more-10473"></span></p>
<p>Unlike IE, Mozilla Firefox is a third-party browser with no integration with Microsoft Windows, and it does not support remote administration by default. Nevertheless, there are ways to remotely configure Firefox like IE. In order to use this procedure you will need a freeware package FirefoxADM. It can be downloaded from the repository <a href="http://sourceforge.net/projects/firefoxadm">SourceForge</a>.</p>
<p><strong>Note:</strong> <b>GFI provides this for customers&#8217; convenience. We</b> <strong>do not</strong> <b>support the FirefoxADM package.</b></p>
<p>Before deploying the proxy settings for Firefox, download and extract the package FirefoxADM on a server with Active Directory.</p>
<h2>Pushing out Firefox proxy settings with GPO</h2>
<ol>
<li>Open the relevant GPO for the site, domain or organizational unit in the Group Policy Object Editor</li>
<li>Expand the following levels within the tree: <strong>User Configuration</strong><b> </b>&gt; <strong>Windows Settings</strong> &gt; <strong>Scripts (Logon/Logoff)</strong></li>
<li>Double-click <strong>Proxy-settings</strong> in the main policy area</li>
<li>Click the <strong>Show Files</strong> button; this will display the folder the script will be stored in</li>
<li>Copy and paste the script <strong>firefox_login.vbs</strong> from the <strong>FirefoxADM</strong><b> </b>package into the folder</li>
<li>Return to the <strong>Logon</strong> <strong>Properties</strong><b> </b>window and click <strong>Add</strong></li>
<li>Browse to the location of the start scripts folder where the script was just copied to, select the file and click the <strong>Open</strong> button</li>
<li>Click <strong>OK</strong> and then <strong>OK</strong> again to save the changes.</li>
</ol>
<p>This has now configured the GPO to run a script which locks down the Firefox settings when the machine first starts up. You now need to add and configure the Administrative Templates which will be used to define the locked down proxy settings:</p>
<ol>
<li>Expand the <strong>User Configuration</strong> level in the tree</li>
<li>Right-click <strong>Administrative Templates</strong> and select <strong>Add/Remove Templates</strong></li>
<li>Click the <strong>Add</strong> button and browse to the location of the startup template<b> </b><strong>firefoxdefaults.adm</strong>, select the file and click <strong>Open</strong>, then Click <strong>Close</strong></li>
<li>Expand the <strong>Administrative Templates</strong> level under <strong>Computer</strong> <strong>Configuration</strong></li>
<li>Select <strong>Mozilla Firefox Default Settings</strong> in the tree</li>
<li>Double-click <strong>Proxy Settings</strong> in the main policy area</li>
<li>Select the radio button <strong>Enabled</strong></li>
<li>At this point you can begin entering the proxy settings that are to be pushed to users; this information can be found in your provisioning email</li>
<li>Once finished click <strong><strong>OK.</strong></strong></li>
</ol>
<p>This policy and any subsequent changes will only be refreshed on user login, or alternatively you can force a GPO update from command prompt if available (the command is: gpupdate /force).</p>
<h2>Locking down Firefox proxy settings with GPO</h2>
<ol>
<li>Open the relevant GPO for the site, domain or organizational unit in the Group Policy Object Editor</li>
<li>Expand the following levels within the tree: <strong>Computer Configuration</strong> &gt; <strong>Windows Settings</strong><b> </b>&gt; <strong>Scripts (Logon/Logoff)</strong></li>
<li>Double-click <strong>Startup</strong> in the main policy area</li>
<li>Click the <strong>Show Files</strong> button, this will display the folder the script will be stored in</li>
<li>Copy and paste the script <strong>firefox_startup.vbs</strong> from the FirefoxADM package into the folder</li>
<li>Returning to the window, click <strong>Add</strong> in <strong>Startup</strong> <strong>properties</strong></li>
<li>Browse to the location of the start scripts folder where the script was just copied to, select the file and click the <strong>Open</strong> button</li>
<li>Click <strong>OK</strong> and then <strong>OK</strong> again to save the changes.</li>
</ol>
<p>This has now configured the GPO to run a script which will lockdown the Firefox settings when the machine first starts up. You now need to add and configure the Administrative Templates which will be used to define the locked down proxy settings:</p>
<ol>
<li>Expand the <strong>Computer Configuration</strong> level in the tree</li>
<li>Right-click <strong>Administrative Templates</strong> and select <strong>Add/Remove Templates</strong></li>
<li>Click the <strong>Add</strong> button and browse to the location of the startup template<b> </b><strong>firefoxlock.adm</strong>, select the file and click <strong>Open</strong>, then click <strong>Close</strong></li>
<li>Expand the <strong>Administrative Templates</strong> level under <strong>Computer Configuration</strong></li>
<li>Select <strong>Mozilla Firefox Locked Settings</strong> in the tree</li>
<li>Double-click <strong>Proxy Settings</strong> in the main policy area</li>
<li>Select the radio button <strong>Enabled</strong></li>
<li>At this point you can begin entering the proxy settings that are to be pushed to users; this information can be found in your provisioning email</li>
<li>Once finished click <strong><strong>OK.</strong></strong></li>
</ol>
<p>This policy and any subsequent changes will only be refreshed on system start up.</p>
<p>Do you have any questions? Leave us a comment below and I’ll reply to your query.</p>
<p>&nbsp;</p>
<p><b><i>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</i></b></p>
<h1></h1>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/how-to-prevent-users-from-changing-gfi-webmonitor-proxy-settings-in-firefox-using-group-policies/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>GFI MailArchiver™ 2011: A Key Tool in Your VAR Toolbox</title>
		<link>http://www.gfi.com/blog/gfi-mailarchiver-2011-a-key-tool-in-your-var-toolbox/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gfi-mailarchiver-2011-a-key-tool-in-your-var-toolbox</link>
		<comments>http://www.gfi.com/blog/gfi-mailarchiver-2011-a-key-tool-in-your-var-toolbox/#comments</comments>
		<pubDate>Thu, 24 Nov 2011 15:00:08 +0000</pubDate>
		<dc:creator>Brian Azzopardi</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[GFI Fixes It]]></category>
		<category><![CDATA[Exchange]]></category>
		<category><![CDATA[GFI MailArchiver]]></category>
		<category><![CDATA[GFI MailArchiver 2011 R3]]></category>
		<category><![CDATA[MailInsights]]></category>
		<category><![CDATA[Partners]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3622</guid>
		<description><![CDATA[GFI’s partners are key to our success and our aim is to help them drive efficiencies and bring the benefits of IT to the wider market. A key product in GFI’s portfolio is GFI MailArchiver – a highly successful product &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2011/11/MailInsights.jpg"><img class="alignright size-medium wp-image-3623" style="border-width: 0px; border-color: black; border-style: solid; margin: 10px;" title="MailInsights" alt="" src="http://www.gfi.com/blog/wp-content/uploads/2011/11/MailInsights-200x300.jpg" width="180" height="270" /></a>GFI’s partners are key to our success and our aim is to help them drive efficiencies and bring the benefits of IT to the wider market. A key product in GFI’s portfolio is GFI MailArchiver – a highly successful product that gets better with each release. We believe that GFI MailArchiver is a key tool in our Partners’ toolbox.</p>
<p>There is still a lot of opportunity in email archiving &#8211; around <a href="http://www.gfi.com/page/99553/gfi174-software-survey-69-of-u.s.-businesses-say-employee-requests-for-deleted-email-retrieval-negatively-impact-it-staff-productivity">45% of SMBs still do not have an email archiving solution</a>. There are tens of millions of Exchange seats out there, and because these organizations do not have email archiving software in place, they are facing key IT challenges every day. The process of archiving electronic information is the essence of what an email archiving solution does. However, email archiving software goes beyond that; the technology helps solve key challenges IT staff face, primarily, lower email management costs and reducing legal risks.<span id="more-3622"></span></p>
<p>Email archiving helps lower email management costs in a number of ways. By offloading Exchange an email archiving solution reduces the load on Exchange, making it less sluggish and, because there is less email stored, backup and restore times are reduced. PST files spread throughout the organization on desktops and laptops are an IT headache. An email archiving solution allows the organization to get rid of PST-related management and backup overhead, while giving users virtually unlimited mailboxes.</p>
<p>Organizations also face compliance issues and e-discovery regulations: sources of legal risk that archiving software mitigates. With advanced search, legal hold and retention policy support, an email archiving solution is a key component of any compliant organization. Also, with more and more countries passing data protection acts, procedures on the timely production of evidence and other regulations, organizations are compelled to respond.</p>
<p>With the latest GFI MailArchiver 2011 R3 release, GFI has innovated in the archiving space to deliver actionable information to organizations of any size. By not letting digital archives gather ‘dust’, GFI MailArchiver does more than traditional archiving software and directly appeals to business owners and other stake holders in the organization. The <a href="http://www.gfi.com/pages/mailinsights.asp">MailInsights</a> module in the latest R3 release helps organizations, for example, see who is abusing web-based email, helps them gain visibility into how email storage is being used, and allows them to determine email responsiveness. By leveraging the rich data in email, email archiving is ever more relevant to the organization. We’re no longer simply talking about archiving but also gathering business and behavioral intelligence.</p>
<p>Resellers have good reason to be excited; large numbers of SMBs still rely on PST files, legal regulations that mandate archiving software are on the increase, and innovation in the marketplace makes archiving even more appealing and salient to SMBs – A perfect opportunity to target new business and have the edge on the competition.</p>
<p>Have a look at what GFI MailArchiver can do to improve your <a href="http://www.gfi.com/email-archiving-exchange?adv=13558&amp;loc=10">email archiving</a> system, or just <a href="http://landmar.gfi.com/archive-exchange-server-sm?adv=13558&amp;loc=24">download a free trial</a> and give it a spin!</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/gfi-mailarchiver-2011-a-key-tool-in-your-var-toolbox/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>GFI LANguard™ 2011 Released!</title>
		<link>http://www.gfi.com/blog/gfi-languard-2011-released/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gfi-languard-2011-released</link>
		<comments>http://www.gfi.com/blog/gfi-languard-2011-released/#comments</comments>
		<pubDate>Thu, 19 May 2011 13:11:54 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[GFI Fixes It]]></category>
		<category><![CDATA[Headline]]></category>
		<category><![CDATA[GFI LANguard]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[network vulnerability solution]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[security management]]></category>
		<category><![CDATA[security scanner]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3286</guid>
		<description><![CDATA[GFI LANguard is the first network vulnerability and patch management solution to integrate with more than 1,500 critical security applications The GFI Infrastructure Business Unit announces the launch of GFI LANguard™ 2011, the latest version of the company’s comprehensive network &#8230;]]></description>
				<content:encoded><![CDATA[<p><strong><a class="lightbox" title="product launch" href="http://www.gfi.com/blog/wp-content/uploads/2010/10/product-launch.jpg"><img class="alignright size-medium wp-image-2963" style="margin: 10px; border: 0px solid black;" title="product launch" src="http://www.gfi.com/blog/wp-content/uploads/2010/10/product-launch-300x182.jpg" alt="" width="300" height="182" /></a>GFI LANguard is the first network vulnerability and patch management solution to integrate with more than 1,500 critical security applications</strong></p>
<p style="text-align: left;"><strong></strong>The GFI Infrastructure Business Unit announces the launch of <a href="http://www.gfi.com/lannetscan" target="_blank">GFI LANguard™ 2011</a>, the latest version of the company’s comprehensive network vulnerability scanning and patch management solution. GFI LANguard 2011 is the first network vulnerability and patch management solution to integrate with more than 1,500 security applications and to include keyword search functionality, illustrating GFI’s commitment to providing small and medium-sized businesses (SMBs) with innovative products that meet the needs of today’s dynamic IT environments.</p>
<p style="text-align: left;"><span id="more-3286"></span>GFI LANguard 2011 combines vulnerability scanning, patch management and network and software auditing into one solution that enables IT professionals to scan, detect, assess and correct potential security risks on their networks with minimal administrative effort. GFI LANguard provides administrators the ability to inventory devices attached to their networks; receive change alerts, such as notification when a new application is installed; ensure antivirus applications are current and enabled; and strengthen compliance with industry regulations through automated patch management that defends against potential network vulnerabilities. The solution can manage of up to 5,000 machines from a single console.</p>
<p><strong>Enhanced features of GFI LANguard 2011 include:</strong></p>
<ul>
<li><strong>Complete Network Security Awareness</strong> – incorporates a new management dashboard that processes all security scans, provides current network security status and maintains a history of all relevant changes made to the network.</li>
<li><strong>Easier Security Management</strong> – integrates with more than 1,500 critical security applications, including antivirus, antispyware, firewall, URL filtering, instant messaging, peer- to-peer, disk encryption, VPN, data loss prevention, backup, and device-access control solutions to quickly and easily identify existing security infrastructure, report on the status of each application and remediate any security issues.</li>
<li><strong>Quick Text Search</strong> – enables administrators to perform keyword searches in scan results to quickly and easily ensure specific actions were performed.</li>
<li><strong>Faster Security Scanning</strong> – uses local agents to automate and distribute the scanning load across client machines, resulting in faster and more accurate scans. Thousands of machines, even in Wide Area Network (WAN) environments, can be scanned in minutes.</li>
<li><strong>Enhanced Reporting</strong> – simplifies report management and distribution. Payment Card Industry Data Security Standard (PCI DSS) dedicated reports are also available to help organizations prove compliance.</li>
<li><strong>Virtual Infrastructure Recognition</strong> – detects virtual machines hosted by scanned computers, giving administrators a complete view of their virtual infrastructure.</li>
</ul>
<blockquote><p>“We designed GFI LANguard 2011 to be a virtual security consultant for our customers,” said Cristian Florian, product manager, GFI Software. “We constantly strive to enhance our products with innovative new features that meet the evolving needs of SMBs. Our last version of GFI LANguard was the first network security solution to automate missing patch detection and remediation for the top five Web browsers running on Windows-based systems, and GFI LANguard 2011 is now the first solution of its kind to integrate with 1,500 critical security applications.”</p></blockquote>
<h3>Driving Innovation for SMBs</h3>
<p>GFI Software’s Infrastructure Business Unit develops a broad range of solutions that help SMBs strengthen their IT operations and better manage all the devices attached to their network. Infrastructure solutions provided by GFI include: data backup and recovery, log management, network fax server, network monitoring, network vulnerability scanning, patch management, network access control and web monitoring. To learn more, email sales@gfi.com or visit <a href="http://www.gfi.com" target="_blank">www.gfi.com</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/gfi-languard-2011-released/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Discussing fax routing methods</title>
		<link>http://www.gfi.com/blog/discussing-fax-routing-methods/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=discussing-fax-routing-methods</link>
		<comments>http://www.gfi.com/blog/discussing-fax-routing-methods/#comments</comments>
		<pubDate>Tue, 11 Jan 2011 15:45:49 +0000</pubDate>
		<dc:creator>Ernest Byrd</dc:creator>
				<category><![CDATA[GFI Fixes It]]></category>
		<category><![CDATA[fax routing]]></category>
		<category><![CDATA[GFI FAXmaker]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3098</guid>
		<description><![CDATA[This article will identify and discuss the primary routing methods utilized by the GFI FAXmaker fax application and many other fax applications on the market today. CSID &#8211; Called Subscriber Identification CSID is a string which identifies the fax receiving &#8230;]]></description>
				<content:encoded><![CDATA[<p><a class="lightbox" title="fax routing" href="http://www.gfi.com/blog/wp-content/uploads/2010/12/fax-routing.jpg"><img class="alignright size-medium wp-image-3099" style="margin: 10px;" title="fax routing" alt="" src="http://www.gfi.com/blog/wp-content/uploads/2010/12/fax-routing-300x207.jpg" width="300" height="207" /></a>This article will identify and discuss the primary routing methods utilized by the <a href="http://www.gfi.com/fax-server-software?adv=13558&amp;loc=7">GFI FAXmaker</a> fax application and many other fax applications on the market today.</p>
<h2><strong>CSID &#8211; </strong>Called Subscriber Identification</h2>
<p>CSID is a string which identifies the fax receiving party’s station or number.  This string can be programmed in the fax machine or fax application, and can be a combination of letters and/or numbers.  More frequently, this CSID value will be composed of strictly numbers, as it may help identify the number being sent to.  In addition, CSID is commonly associated with TSID (Transmitting Subscriber Identification), and the two are used almost interchangeably.  The TSID is the string which identifies the fax sending party’s station or number.  The CSID is provided to the sending party in the initial phases of the faxing process.</p>
<p><span id="more-3098"></span></p>
<p>CSID is one of the more basic routing methods and allows for a fax to be routed based on the CSID/TSID of the sending party.  In order for this routing to occur, the CSID/TSID must match exactly as the number is programmed in the sending party’s device.  Be sure not to confuse CSID with CLID (calling line identification), as many fax applications in an analog environment do not support routing based on CLID.</p>
<h2><strong>DTMF/DID</strong></h2>
<ul>
<li><strong>DTMF &#8211; </strong>Dual-tone multi-frequency</li>
</ul>
<p>DTMF is a telecommunication signaling technology that utilizes touch-tones for routing over an analog line.  The concept of DTMF routing is similar to DID routing (description found below) except a digital environment is not necessary.  It is still necessary that you purchase a DID block, but the tones may either be supplied by your Telco provider directly, or you may have a gateway device internally that converts a digital to analog signal; the tones may be provided from this device directly if it supports DTMF signaling. <a href="http://www.dialogic.com/support/helpweb/brooktrout/iw1464.aspx" target="_blank">Read more on DTMF technology.</a></p>
<ul>
<li><strong>DID &#8211; </strong>Direct inward dialing</li>
</ul>
<p>DID is a feature offered by a Telco provider for use with a customer’s PBX (Private Branch Exchange); additionally, DID may be referred to as DDI (direct dial-in) in European regions.  The DID feature involves the implementation of one or more trunk lines tied to the customer’s PBX, and associated with the line(s) is a range of telephone numbers.  When calls are presented to the PBX, the DNIS (Dialed Number Identification Service) is transmitted, which allows routing to a direct extension.  Typically, the DNIS ranges from four to ten digits, but most commonly it is the last four digits of the number dialed. <a href="http://www.dialogic.com/support/helpweb/brooktrout/iw1463.aspx" target="_blank">Read more on DID technology.</a></p>
<p>Both <strong>DTMF</strong> and <strong>DID </strong>routing allow for individual routing to a user without having the overhead of an individual line for each user.  Instead of a one to one relation, both of these technologies focus on bandwidth consumption.  As an example, if you have 500 users who receive faxes, but on average receive twelve faxes consistently, one of these would be a suggested routing method (depending on your telephony environment).</p>
<h2><strong><a href="http://www.gfi.com/blog/ocr-integrate-faxing/" target="_blank">OCR &#8211; Optical character recognition</a></strong></h2>
<p>OCR is the technology that allows for the conversion of handwritten or typed printed material to a digital form, to be edited or manipulated by a computer.  In the case of faxing, OCR software may be implemented in combination with faxing software to parse the contents of the received fax job in order to route based on keyword(s) found within the document.  This is a more common routing method in a smaller environment where limited telephony variables are available.  A user may have ten users and only one or two fax lines, but can still perform routing to individual users.</p>
<h2><strong>Line</strong></h2>
<p>There is no acronym for line routing, as line routing is pretty self-explanatory.  Line routing involves the ability to route one line to one user (or group, in given scenarios).  This may be used more commonly in an environment where all faxes are to go to a general user or mailbox, such as a Human Resource Professional.  These fax jobs may be further analyzed and manually distributed based on the fax contents.</p>
<h2><strong>MSN &#8211; </strong>Multiple Subscriber Number</h2>
<p>MSN routing is similar to DID routing, but MSN routing does not require the purchase of DID numbers.  MSN technology relies on ISDN circuitry and allows for tying multiple numbers to one line; these numbers do not have to be contiguous in nature.  Most commonly, MSN technology is used in European regions. <a href="http://www.dialogic.com/support/helpweb/divaclient/dc16.aspx" target="_blank">Read more on MSN technology.</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/discussing-fax-routing-methods/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>What is OCR and how does it integrate with faxing?</title>
		<link>http://www.gfi.com/blog/ocr-integrate-faxing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ocr-integrate-faxing</link>
		<comments>http://www.gfi.com/blog/ocr-integrate-faxing/#comments</comments>
		<pubDate>Tue, 04 Jan 2011 13:00:32 +0000</pubDate>
		<dc:creator>Ernest Byrd</dc:creator>
				<category><![CDATA[GFI Fixes It]]></category>
		<category><![CDATA[fax server]]></category>
		<category><![CDATA[GFI FAXmaker]]></category>
		<category><![CDATA[OCR]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3096</guid>
		<description><![CDATA[As an introduction to this topic, it would be best to explain what OCR stands for and what it does. When discussing technology and computers, &#8216;OCR&#8217; is the common abbreviation for Optical Character Recognition and involves the electronic translation of &#8230;]]></description>
				<content:encoded><![CDATA[<p><a class="lightbox" title="OCR" href="http://www.gfi.com/blog/wp-content/uploads/2010/12/OCR.jpg"><img class="alignright size-medium wp-image-3097" style="margin: 10px;" title="OCR" alt="" src="http://www.gfi.com/blog/wp-content/uploads/2010/12/OCR-224x300.jpg" width="179" height="240" /></a>As an introduction to this topic, it would be best to explain what OCR stands for and what it does.</p>
<p>When discussing technology and computers, &#8216;OCR&#8217; is the common abbreviation for Optical Character Recognition and involves the electronic translation of scanned, handwritten or typed text images into a digital form that a computer can manipulate.</p>
<p>All OCR systems include an optical scanner for reading the text, and also include sophisticated software for analyzing and processing the image.  This sophisticated software utilizes algorithms and identification mechanisms in order to review the curvature and outline of the provided text for proper recognition.  Although some OCR options may utilize hardware and software in combination to achieve desired results, the more frequently used and cost effective option is strictly software based.</p>
<p><span id="more-3096"></span></p>
<p>OCR is widely used to convert books, magazine articles, and documents into electronic files in order to create a digital record-keeping system.  This makes it possible to edit the text or quickly search for a word or phrase in what was once data in a printed form.</p>
<p>Now you may ask, “What does OCR have to do with faxing?”  To answer this, most faxing applications may utilize OCR as an option for routing.  Some smaller environments may have more basic telephony systems and cannot afford the overhead of multiple lines for unique recipient routing, and this is where the OCR technology may become very valuable.</p>
<p>A suggested implementation of the OCR technology being utilized with a faxing application would be in an environment where resumes may be faxed to a Human Resources department.  As a job opening becomes available, keywords may be implemented in an OCR module of the faxing application to define the position; this allows for saving much time in unnecessary resume review.  Because an OCR module review may take a fraction of the time of a human review, a Human Resource professional may be able to focus on other delegated duties.</p>
<p>The <a href="http://www.gfi.com/fax-server-software?adv=13558&amp;loc=7">GFI FAXmaker</a> faxing application provides an optional OCR module which can be used to route to a single employee based on the name, and also allows for routing based on keyword(s).  Although OCR is not a 100% effective technology (handwritten text may be harder to parse and analyze), it is still a great option for any small business, and its effectiveness continues to progress as the technology improves.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/ocr-integrate-faxing/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Licensing explained: TE-Systems XCAPI and Brooktrout SR140 with GFI FAXmaker 2011</title>
		<link>http://www.gfi.com/blog/licensing-explained-tesystems-xcapi-brooktrout-sr140-gfi-faxmaker-2011/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=licensing-explained-tesystems-xcapi-brooktrout-sr140-gfi-faxmaker-2011</link>
		<comments>http://www.gfi.com/blog/licensing-explained-tesystems-xcapi-brooktrout-sr140-gfi-faxmaker-2011/#comments</comments>
		<pubDate>Tue, 14 Dec 2010 16:35:17 +0000</pubDate>
		<dc:creator>Owen Baldacchino</dc:creator>
				<category><![CDATA[GFI Fixes It]]></category>
		<category><![CDATA[Brooktrout]]></category>
		<category><![CDATA[fax server]]></category>
		<category><![CDATA[GFI FAXmaker]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3056</guid>
		<description><![CDATA[With the release of GFI FAXmaker 2011, it is possible to choose a FOIP system utilizing TE-Systems XCAPI or Brooktrout SR140 in conjunction with a VOIP Gateway that supports T38 fax or G711 pass through. The installation drivers for TE-Systems &#8230;]]></description>
				<content:encoded><![CDATA[<p>With the <a href="http://www.gfi.com/fax-server-software?adv=13558&amp;loc=7" target="_blank">release of GFI FAXmaker 2011</a>, it is possible to choose a FOIP system utilizing TE-Systems XCAPI or Brooktrout SR140 in conjunction with a VOIP Gateway that supports T38 fax or G711 pass through. The installation drivers for TE-Systems XCAPI are now bundled with the installation file of GFI FAXmaker 2011. The installation drivers for Brooktrout SR140 have been present since GFI FAXmaker 14.3 and have been updated in GFI FAXmaker 2011. In this blog post we will uncover the licensing requirements for FOIP.</p>
<p><span id="more-3056"></span></p>
<h2>Brooktrout SR140</h2>
<p>The Brooktrout SR140 is licensed separately from GFI FAXmaker by means of an Activation code; however , the GFI FAXmaker license key must be SR140 enabled together with a valid Software Maintenance Agreement.</p>
<p>Brooktrout Licensing utilizes a “node lock” issued by Dialogic via the Brooktrout License Manager or at <a href="http://www.dialogic.com/activation" target="_blank">http://www.dialogic.com/activation</a>. The Activation code needs to be inserted in the Activation webpage along with the “Node ID” returned from the Brooktrout License Manager according to the Network Interface card to be used for SR140. The generated Brooktrout license can be “node-locked” to another MAC address only once via automatic methods – all subsequent “re-hosting” must involve Dialogic support.</p>
<p>When evaluating Brooktrout SR140, a 30-day Activation code can be requested from GFI Sales. GFI FAXmaker 2011 ships with drivers based on Brooktrout SDK6.3 that introduced a new licensing scheme (SR140-L). This makes Brooktrout licenses more affordable for low density fax environments.</p>
<p style="text-align: center;"><a class="lightbox" title="FAX article 1" href="http://www.gfi.com/blog/wp-content/uploads/2010/12/FAX-article-11.jpg"><img class="size-medium wp-image-3060 aligncenter" style="margin-top: 10px; margin-bottom: 10px;" title="FAX article 1" alt="" src="http://www.gfi.com/blog/wp-content/uploads/2010/12/FAX-article-11-300x58.jpg" width="300" height="58" /></a></p>
<p><em>Source: <a href="http://www.dialogic.com/products/ip_enabled/docs/10824_SR140_ds.pdf" target="_blank">http://www.dialogic.com/products/ip_enabled/docs/10824_SR140_ds.pdf</a></em></p>
<h2>TE-Systems XCAPI</h2>
<p>TE-Systems XCAPI is also licensed separately from GFI FAXmaker by means of an Activation code however the GFI FAXmaker license key must include a valid Software Maintenance Agreement. The XCAPI license can be bound to either one of these options:</p>
<ul>
<li>USB dongle that must be inserted in the machine hosting XCAPI</li>
<li>MAC address of the Network Interface card</li>
<li>Virtual ID in case of Virtual machines</li>
</ul>
<p>The Activation code needs to be inserted in the Activation webpage <a href="http://www.te-systems.de/licence/index_en.html " target="_blank">http://www.te-systems.de/licence/index_en.html</a> along with the MAC Address or Virtual ID returned from the XCAPI configuration. The generated XCAPI license cannot be used on other machines. Subsequent “re-hosting” must involve TE-Systems support. In evaluation mode no key is required however the limitations are:</p>
<ul>
<li>a maximum of 4 lines can be used at the same time</li>
<li>voice calls will play a demo message every 30 seconds</li>
<li>fax calls will render a demo banner on the left edge of the document</li>
</ul>
<p>GFI FAXmaker 2011 ships with the XCAPI driver installation package. Simply run the installer and follow the on-screen instructions to setup the configuration.</p>
<p style="text-align: center;"><a class="lightbox" title="FAX article 2" href="http://www.gfi.com/blog/wp-content/uploads/2010/12/FAX-article-2.jpg"><img class="size-medium wp-image-3061 aligncenter" style="margin-top: 10px; margin-bottom: 10px;" title="FAX article 2" alt="" src="http://www.gfi.com/blog/wp-content/uploads/2010/12/FAX-article-2-300x222.jpg" width="300" height="222" /></a></p>
<p><em>Source: <a href="http://www.te-systems.de/te_common/dodownload.php?id=1251" target="_blank">http://www.te-systems.de/te_common/dodownload.php?id=1251 </a></em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/licensing-explained-tesystems-xcapi-brooktrout-sr140-gfi-faxmaker-2011/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Patch Deployment in 3 Easy Steps</title>
		<link>http://www.gfi.com/blog/patch-deployment-easy-steps/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=patch-deployment-easy-steps</link>
		<comments>http://www.gfi.com/blog/patch-deployment-easy-steps/#comments</comments>
		<pubDate>Fri, 19 Nov 2010 14:07:11 +0000</pubDate>
		<dc:creator>Ben Vincenti</dc:creator>
				<category><![CDATA[GFI Fixes It]]></category>
		<category><![CDATA[GFI LANguard]]></category>
		<category><![CDATA[patch deployment]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[security vulnerabilities]]></category>
		<category><![CDATA[vulnerability scanning]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3007</guid>
		<description><![CDATA[Picture a scenario of a network on 1000 hosts. On performing a network audit, it is found that 10 machines (servers and workstations) are un-patched. Although this might not seem like a large percentage (1%), one must keep in mind &#8230;]]></description>
				<content:encoded><![CDATA[<p><a class="lightbox" title="patch deployment" href="http://www.gfi.com/blog/wp-content/uploads/2010/11/patch-deployment.jpg"><img class="alignright size-medium wp-image-3008" style="margin: 10px;" title="patch deployment" alt="" src="http://www.gfi.com/blog/wp-content/uploads/2010/11/patch-deployment-300x222.jpg" width="300" height="222" /></a>Picture a scenario of a network on 1000 hosts. On performing a network audit, it is found that 10 machines (servers and workstations) are un-patched. Although this might not seem like a large percentage (1%), one must keep in mind that it only takes one unprotected machine to infect and/or completely bring down an entire network.</p>
<p><span id="more-3007"></span></p>
<p>Here are some of the potential repercussions of simply having 1 un-patched machine on the network:</p>
<ul>
<li>Downtime and loss of productivity due to reinstallation</li>
<li>Questionable data integrity due to a successful exploit</li>
<li>Negative public relations due to systems unavailable for your customers</li>
<li>Legal problems should your patch management process go under a judicial microscope</li>
</ul>
<p>Here are the simple three steps to successfully manage the patch deployment process using <a href="http://www.gfi.com/network-security-vulnerability-scanner?adv=13558&amp;loc=9" target="_blank">GFI LANguard</a>:</p>
<ol>
<li><strong>Scanning for vulnerabilities and building an application inventory</strong>The first step would be to establish an inventory of your organization’s network and the software deployed on it. Without a proper inventory, patching becomes a very daunting task. In addition to this, machines should also be prioritized by creating a risk profile based on their necessity to the organization. GFI LANguard ships with an applications inventory which provides a list of all applications detected during past scans.For the inventory discussed above to be populated automatically, an initial scan of all machines must be done. You can choose to run a scheduled custom scan to simply detect for missing patches and service packs. This would scan the machines to list the software installed on each one. The scan results would then save the applications detected in the scans in the applications inventory.With each new scan, any new applications which may have been installed would also be detected by the scan and added to the applications inventory. GFI LANguard would then automatically download any patches and service packs for the applications that need patching.</li>
<li><strong>Analyzing the results</strong>The most important task following a network security scan is identifying which areas and systems require your immediate attention. This is achieved by analyzing and correctly interpreting the information collected and generated during a network security scan. Upon completing a scan, GFI LANguard immediately displays a scan summary that graphically displays the vulnerability level of the scanned computer or a combined interpretation of the scan results obtained following a network scan.The scan results also show a vulnerability level. A vulnerability level is a rating given by GFI LANguard to each computer after it has been scanned. This rating indicates the vulnerability level of a computer/network, depending on the number and type of vulnerabilities and/or missing patches found. <a href="http://kbase.gfi.com/showarticle.asp?id=KBID002573" target="_blank">See a complete list of software products supported by GFI LANguard</a>. Once a scan has been performed, and its results analyzed, the final step would be to remediate the vulnerabilities.</li>
<li><strong>Remediating the vulnerabilities</strong>Once you have performed a scan and analyzed the results, you can now configure GFI LANguard to automatically fix some of the issues identified during your network audit. This is achieved through the built-in tools that ship with the product. Available remediation actions include:</li>
</ol>
<ul>
<li><strong>Auto-patch managemen</strong>t – This remediation feature automatically downloads missing updates and deploys them network-wide.</li>
<li><strong>Applications auto-uninstall</strong> – This remediation action enables the auto-uninstall of applications that support silent uninstall. This remediation action auto-uninstalls the applications of your choice from the application inventory outlined above. The process involves a test phase (called validation) during which an application is uninstalled automatically to identify if silent uninstall is supported by target application. If it is, all the other instances on the network will be automatically uninstalled during scheduled scans.</li>
</ul>
<p>Sometimes drastic action may be necessary to protect your organization’s network. You can always disable the machine’s account and immediately start the patch management process on this infected/un-patched machine.</p>
<p>If this doesn’t work, then disable the switch port that the workstation connects to or move the machine to a quarantined network. This will allow you to remediate the vulnerabilities on this machine in a confined environment, without increasing the risk of the entire network getting infected.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/patch-deployment-easy-steps/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>Troubleshooting FOIP issues</title>
		<link>http://www.gfi.com/blog/troubleshooting-foip-issues/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=troubleshooting-foip-issues</link>
		<comments>http://www.gfi.com/blog/troubleshooting-foip-issues/#comments</comments>
		<pubDate>Thu, 07 Oct 2010 14:00:33 +0000</pubDate>
		<dc:creator>Owen Baldacchino</dc:creator>
				<category><![CDATA[GFI Fixes It]]></category>
		<category><![CDATA[fax server]]></category>
		<category><![CDATA[FOIP]]></category>
		<category><![CDATA[troubleshooting]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2917</guid>
		<description><![CDATA[Although FAX over Internet Protocol (FOIP) has been around for a few years, lately there has been a steady rate of adoption of this technology. A wide choice of VOIP Gateways, significant reduction of phone bills through least cost routing &#8230;]]></description>
				<content:encoded><![CDATA[<p><a class="lightbox" title="troubleshooting-1" href="http://www.gfi.com/blog/wp-content/uploads/2010/09/troubleshooting-1.jpg"><img class="alignright size-medium wp-image-2918" style="margin: 10px;" title="troubleshooting-1" alt="" src="http://www.gfi.com/blog/wp-content/uploads/2010/09/troubleshooting-1-206x300.jpg" width="144" height="210" /></a>Although FAX over Internet Protocol (FOIP) has been around for a few years, lately there has been a steady rate of adoption of this technology. A wide choice of VOIP Gateways, significant reduction of phone bills through least cost routing and added scalability options are just a few of the reasons why this technology is proving to be increasingly attractive for organizations that rely on faxing for their core business. Out of the box <a href="http://www.gfi.com/fax-server-software?adv=13558&amp;loc=7" target="_blank">GFI FAXmaker</a> can be implemented to utilize FOIP technology, delivering highly reliable faxing over VOIP networks using T.38 in conjunction with either SIP or H.323 protocols.</p>
<p>Depending on the VOIP setup, configuration and troubleshooting of VOIP Gateways can be tricky. In this short article I will be discussing tips &amp; techniques to use during configuration and troubleshooting issues with FOIP.</p>
<p><span id="more-2917"></span></p>
<p><strong>Key FOIP components</strong></p>
<p>The basic VOIP setup would consist of the fax server (GFI FAXmaker), the FOIP Software (Brooktrout SR140 or TE-Systems XCAPI) and the VOIP Gateway. The first step is to check the configuration of the VOIP Gateway settings according to the manufacturer’s recommendations including the specific settings for the FOIP protocol to be used (SIP or H.323). Then on the FOIP Software, you need to insert the correct settings to be used with the VOIP Gateway. Normally just the VOIP Gateway IP is needed to be configured in the FOIP Software for the faxing to work however some other configuration tweaks may be necessary.</p>
<h2>Base investigation</h2>
<p>The advantage of using FOIP is that it is IP based and you can run a network sniffer tool to troubleshoot problems. A very useful tool in such cases is <a href="http://www.wireshark.org" target="_blank">Wireshark</a>.</p>
<p>Here is the procedure to sniff and analyze the FOIP calls:</p>
<ol>
<li>Download and install Wireshark on the fax server. The machine running Wireshark can also be a separate machine connected to an Ethernet hub between the machine running the FOIP Software and the VOIP Gateway.</li>
<li>Run Wireshark and choose Capture -&gt; Interfaces. Click start next to the Interface used by the FOIP Software.</li>
<li>Send/Receive a test call. When finished, stop the capture.</li>
<li>Click in Telephony -&gt; VOIP Calls to open a list of all the VOIP calls which occurred during the capture. Select the call and click on Graph/Flow.</li>
</ol>
<p>Captures can be saved to a *.pcap file and sent to GFI Support personnel for further analysis. It is important to specify the make and model of your FOIP Gateway and which FOIP Software is being used.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/troubleshooting-foip-issues/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to Create a Backup – Part 1</title>
		<link>http://www.gfi.com/blog/create-backup-part-1/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=create-backup-part-1</link>
		<comments>http://www.gfi.com/blog/create-backup-part-1/#comments</comments>
		<pubDate>Mon, 27 Sep 2010 10:18:02 +0000</pubDate>
		<dc:creator>Victor Pop</dc:creator>
				<category><![CDATA[GFI Fixes It]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[data backup]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2900</guid>
		<description><![CDATA[How to create a backup – part 1 Maybe one of the most important, and the most misunderstood, parts of working with a computer is the backup, or the process of backing up data. As most people know, a backup &#8230;]]></description>
				<content:encoded><![CDATA[<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">How to create a backup – part 1</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">Maybe one of the most important, and the most misunderstood, parts of working with a computer is the backup, or the process of backing up data.</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">As most people know, a backup is usually a complete copy of the important data on a computer. Now, at a minimum, a backup must have a source and a destination. Even if this appears pretty logical, let’s deepen the analysis a bit.</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">The source of a backup must be all the data that one works with. If the data is lost, the backup should contain everything needed in order to continue one’s work. While this might seem straightforward, there are cases when the files needed are scattered apart on the computer’s disk(s).</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">Let’s assume a backup for an accounting program – one would simply select its folder (from the Program Files folder) and create the backup. What happens, usually, is that the respective program saves its working data in other folders, like Application Data, thus making the backup incomplete. This is just a quick scenario that explains the necessity of having the right source for the backup.</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">On the other hand, if the user tries to back up the above-mentioned program on a weekly schedule, the backup program should be able to allow the user to schedule these backups. Forcing the user to select the same data, over and over again, would be counter-productive. Even assuming that the backup source is easy to select, the user is prone to forget about doing the backup, and there are plenty of reasons for why that might happen – the user’s in a hurry, the backup doesn’t seem so important after working a few extra hours, the power went down, and so on. The solution is obvious: the backup program should allow its backups to be scheduled, thus making it easier and safer for the user.</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">Most backup programs offer the possibility of scheduling backups to run on a specific day of the week, or at specified intervals, reducing user interaction to a minimum, while ensuring that the backup is created.</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">All backup programs (that I know of) support the creation of successive backups, overwriting its previous versions. This type of backup goes by the name of replace backup (some call it a normal backup). This way, the backup destination always contains (only!) the most recent backup that was made and, in most cases, the best data for a restore operation. As the saying goes, “A backup is just as important as its age: the newer, the better” (however, this is not true in some cases). While this method of creating a backup is, undoubtedly, among the easiest to program, it has its disadvantages.</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">One of the main problems with this approach is the fact that each backup execution would require about the same time as its first execution. If the backup’s source contains a lot of data, this operation can consume a lot of time and resources – it can easily disturb the user’s work, if the backup runs during work hours.</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">What if the backup source contains thousands of files and the user created/modified only one hundred (or less) files between two backup executions?</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">The little graphic above (note that the data in the graphic does not reflect the performance of a specific backup program and is merely an example) shows that the time needed to create a full backup every time is about the same at every backup, because this approach does not take into account how many files are new or changed after the first backup. It just takes the whole source and copies it to the destination. Leaving out the time needed for a new backup to be completed, this type of backup also uses a lot more resources than would be necessary. It’s obvious that we need all the data backed up, but we want the process to be more efficient – to be faster, to better use the available resources and to consume less space for the backup.</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">A solution to this problem would be the following:</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">1.<span style="white-space: pre;"> </span>create the first backup, as a full backup</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">2.<span style="white-space: pre;"> </span>following the full backup &#8211; at all the other executions of the backup &#8211; check the source against the destination and copy only the new or modified files</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">The checking of the source against the destination can be made by using an index file, making the operation a lot faster than by verifying every byte of every file in the backup’s source and destination.</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">This way, only the first backup will take a long time and a lot of processing power. The next backups will only add information to the first backup, as necessary. This type of backup is usually called, somewhat inappropriately, an incremental backup.</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">Now we can rest assured, for we have a backup to use in case anything goes wrong – and the operation itself will not disturb anyone, especially if it’s scheduled to run at a convenient time.</div>
<p>Maybe one of the most important, and the most misunderstood, parts of working with a computer is the backup, or the process of backing up data.</p>
<p>As most people know, a backup is usually a complete copy of the important data on a computer. Now, at a minimum, a backup must have a source and a destination. Even if this appears pretty logical, let’s deepen the analysis a bit.</p>
<p>The source of a backup must be all the data that one works with. If the data is lost, the backup should contain everything needed in order to continue one’s work. While this might seem straightforward, there are cases when the files needed are scattered apart on the computer’s disk(s).</p>
<p><span id="more-2900"></span></p>
<p>Let’s assume a backup for an accounting program – one would simply select its folder (from the Program Files folder) and create the backup. What happens, usually, is that the respective program saves its working data in other folders, like Application Data, thus making the backup incomplete. This is just a quick scenario that explains the necessity of having the right source for the backup.</p>
<p>On the other hand, if the user tries to back up the above-mentioned program on a weekly schedule, the backup program should be able to allow the user to schedule these backups. Forcing the user to select the same data, over and over again, would be counter-productive. Even assuming that the backup source is easy to select, the user is prone to forget about doing the backup, and there are plenty of reasons for why that might happen – the user’s in a hurry, the backup doesn’t seem so important after working a few extra hours, the power went down, and so on. The solution is obvious: the backup program should allow its backups to be scheduled, thus making it easier and safer for the user.</p>
<p>Most backup programs offer the possibility of scheduling backups to run on a specific day of the week, or at specified intervals, reducing user interaction to a minimum, while ensuring that the backup is created.</p>
<p>All backup programs (that I know of) support the creation of successive backups, overwriting its previous versions. This type of backup goes by the name of <strong>replace backup</strong> (some call it a <strong>normal backup</strong>). This way, the backup destination always contains (only!) the most recent backup that was made and, in most cases, the best data for a restore operation. As the saying goes, “A backup is just as important as its age: the newer, the better” (however, this is not true in some cases). While this method of creating a backup is, undoubtedly, among the easiest to program, it has its disadvantages.</p>
<p>One of the main problems with this approach is the fact that each backup execution would require about the same time as its first execution. If the backup’s source contains a lot of data, this operation can consume a lot of time and resources – it can easily disturb the user’s work, if the backup runs during work hours.</p>
<p>What if the backup source contains thousands of files and the user created/modified only one hundred (or less) files between two backup executions?</p>
<p style="text-align: center;"><a class="lightbox" title="Backup1" href="http://www.gfi.com/blog/wp-content/uploads/2010/09/Backup1.jpg"><img class="aligncenter size-medium wp-image-2901" style="margin-top: 10px; margin-bottom: 10px;" title="Backup1" src="http://www.gfi.com/blog/wp-content/uploads/2010/09/Backup1-300x172.jpg" alt="" width="300" height="172" /></a></p>
<p>The little graphic above (note that the data in the graphic does not reflect the performance of a specific backup program and is merely an example) shows that the time needed to create a full backup every time is about the same at every backup, because this approach does not take into account how many files are new or changed after the first backup. It just takes the whole source and copies it to the destination. Leaving out the time needed for a new backup to be completed, this type of backup also uses a lot more resources than would be necessary. It’s obvious that we need all the data backed up, but we want the process to be more efficient – to be faster, to better use the available resources and to consume less space for the backup.</p>
<p>A solution to this problem would be the following:</p>
<ol>
<li>create the first backup, as a full backup</li>
<li>following the full backup &#8211; at all the other executions of the backup &#8211; check the source against the destination and copy <strong>only</strong> the new or modified files</li>
</ol>
<p>The checking of the source against the destination can be made by using an index file, making the operation a lot faster than by verifying every byte of every file in the backup’s source and destination.</p>
<p style="text-align: center;"><a class="lightbox" title="Backup2" href="http://www.gfi.com/blog/wp-content/uploads/2010/09/Backup2.jpg"><img class="aligncenter size-medium wp-image-2902" style="margin-top: 10px; margin-bottom: 10px;" title="Backup2" src="http://www.gfi.com/blog/wp-content/uploads/2010/09/Backup2-300x172.jpg" alt="" width="300" height="172" /></a></p>
<p>This way, only the first backup will take a long time and a lot of processing power. The next backups will only add information to the first backup, as necessary. This type of backup is usually called, somewhat inappropriately, an <strong>incremental backup</strong>.</p>
<p>Now we can rest assured, for we have a backup to use in case anything goes wrong – and the operation itself will not disturb anyone, especially if it’s scheduled to run at a convenient time.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/create-backup-part-1/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>My emails aren’t being archived by GFI MailArchiver. What do I do?!</title>
		<link>http://www.gfi.com/blog/emails-arent-archived-gfi-mailarchiver/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=emails-arent-archived-gfi-mailarchiver</link>
		<comments>http://www.gfi.com/blog/emails-arent-archived-gfi-mailarchiver/#comments</comments>
		<pubDate>Thu, 16 Sep 2010 10:38:26 +0000</pubDate>
		<dc:creator>Ben Vincenti</dc:creator>
				<category><![CDATA[GFI Fixes It]]></category>
		<category><![CDATA[email archiving]]></category>
		<category><![CDATA[Firebird database]]></category>
		<category><![CDATA[GFI MailArchiver]]></category>
		<category><![CDATA[SQL Express]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2908</guid>
		<description><![CDATA[GFI MailArchiver archives emails by polling them from the journal mailbox you set up in Exchange and storing them in the databases you configure. You can choose to store emails in the inbuilt GFI MailArchiver Firebird database, SQL Express or &#8230;]]></description>
				<content:encoded><![CDATA[<p><img class="alignright size-medium wp-image-2909" style="margin: 10px;" title="email archiving" alt="" src="http://www.gfi.com/blog/wp-content/uploads/2010/09/email-archiving-300x225.jpg" width="270" height="203" /></p>
<p><a href="http://www.gfi.com/email-archiving-exchange?adv=13558&amp;loc=10" target="_blank">GFI MailArchiver</a> archives emails by polling them from the journal mailbox you set up in Exchange and storing them in the databases you configure. You can choose to store emails in the inbuilt GFI MailArchiver Firebird database, SQL Express or Full database or in a SQL + File System database. Therefore, as you can imagine, there are quite a few points of failure and various reasons why your mail might not be archived. You can easily check whether mail is being archived or not by going to ‘Archives Stores’ in the GFI MailArchiver and clicking on ‘View Statistics’ for the active database.</p>
<p><span id="more-2908"></span></p>
<p>Let’s break it down, step by step.</p>
<p>The first thing to check would be your journal mailbox and the account you use for this mailbox.</p>
<ol>
<li>See if you can access this mailbox using OWA or Outlook. If you cannot access this mailbox, chances are the account is locked out in AD or the credentials you specified are incorrect.</li>
<li>If you can access the mailbox, check if emails are entering and leaving the mailbox. An easy way to test if emails are arriving at the journaling mailbox is to go to ‘Mail Servers to Archive’ in the GFI MailArchiver configuration and uncheck ‘Archive emails from this server’ . Then send a couple of outbound, inbound and internal emails and see if they arrive in the inbox. If they do not, then the problem is with your journaling rules in Exchange. You’d might want to create a new journal mailbox as a test. If emails are seen in the journal mailbox, go back to ‘Mail Servers to Archive’ and check ‘Archive emails from this server’. If the emails are polled, then the problem lies within GFI MailArchiver and not in the journal mailbox.</li>
</ol>
<p>Once you have taken the journal mailbox out of the picture, you can then move onto investigating GFI MailArchiver.</p>
<p>First thing to check here is that the database schemas are up to date. To do this, click on ‘Archive Stores’ in the GFI MailArchiver configuration and click on ‘Edit Settings’ for the active database and go through the wizard until you get to the page where it checks for database schema. If the database schema needs updating, the wizard will prompt you to upgrade it.</p>
<p>If the database schema is the latest, you should then go on to check  the &lt;..\GFI\MailArchiver\Core\Queue&gt; and &lt;..\GFI\MailArchiver\Core\Pickup&gt; folders.  GFI MailArchiver will stop polling mails when information on 1000 emails are found in these folders.</p>
<p>There are a number of reasons why emails back up in these folders , mainly Anti-Virus or Backup Software scanning the GFI MailArchiver directory.  Another  would be that GFI MailArchiver cannot communicate correctly to the Firebird or Microsoft SQL database. Reasons for this would be an unstable connection to the database server, or incorrect auto-growth settings for the database, or the transaction log files are not optimally configured. Database timeouts could also cause emails not to transfer to the database.</p>
<h2>What to try – Firebird databases</h2>
<ul>
<li>Ensure that the GFI MailArchiver directory is excluded from real-time backup and/or virus scanning software.</li>
<li>Keep the physical size of the firebird database under 2GB in size &#8211; roll over to a new database every 2 months or every quarter as needed.</li>
<li>If you have a large firebird database, stop archiving, set indexing to a scheduled time of 30/60 minutes and allow everything to settle down (i.e.: finish indexing, archiving the e-mails in the queue, etc) then create a new database and start archiving to that new database.</li>
<li>Ensure that &#8220;disk write caching&#8221; is enabled on the disk that hosts the firebird databases.</li>
<li>Try to keep the databases on another physical disk or spread out over different disks (a spanned volume where drive &#8220;D:&#8221; for example would behind the scenes have 2, 3, 4 disks running, so you don&#8217;t just have one disk head doing all the work and spinning like mad).</li>
<li>If you are getting timeout or deadlock errors, you can also try the following:</li>
</ul>
<ol>
<li>Open ..\MailArchiver\Core\Data\LogSettings.xml with notepad.</li>
<li>Change &lt;MaxThreads&gt;5&lt;/MaxThreads&gt; to 2.</li>
<li>Change &lt;BatchSize&gt;100&lt;/BatchSize&gt; to 50.</li>
<li>Save the file and restart the GFI MailArchiver Core service.</li>
<li>The issue should be resolved.</li>
</ol>
<h2>What to try – SQL databases</h2>
<ul>
<li>Ensure that the GFI MailArchiver directory is excluded from real-time backup and/or virus scanning software.</li>
<li>Ensure that GFI MailArchiver has a stable connection to Microsoft SQL server and that Microsoft SQL Server has enough resources to cope with the load.</li>
<li>Run a scan to check for hard disk errors.</li>
<li>Run a disk defragmentation tool to defragment the hard disk that hosts the SQL databases.</li>
<li>Run an integrity check on the problematic GFI MailArchiver database.</li>
<li>Ensure that there is enough memory and hard disk space to cater for the load.</li>
<li>Ensure that the timeout values from SQL Server itself (including connection timeout) are set to a high value (not the default of 2 minutes).</li>
<li>Ensure that the autogrow of the DATA and TRANSACTION LOG are set to a fixed size (not percentage) and ensure that the database has enough space to grow automatically.</li>
<li>Stop any other applications from making use of the SQL Server, so that GFI MailArchiver is the only one making use of it, and check if the problem persists.</li>
</ul>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/emails-arent-archived-gfi-mailarchiver/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-14 21:11:27 by W3 Total Cache --