Konica Minolta Deploy Account Tracking from Group Policy

We recently had a client who used account tracking on their Konica Minolta. While all the computers were configured to print from the one account they really only used it when photocopying. This created an issue because we couldn’t find a way to deploy the tracking code through group policy so each time a new user logged into a PC they would have to configure the printers authentication.

Using process manager we were able to find the registry key that stores the authentication information. It is contained in


If you configure a printer on a PC, export that key then write a login script to import that key on login the account tracking username and password will be setup.

Deploy Microsoft Client Side Extensions (CSE)

When Microsoft released Server 2008 they had extended Group Policy to allow for a bunch of new things. These include mapping network drives and installing printers from within group policy removing the need to make a login script. For these to work with Windows Vista and XP a plugin called Client Side Extensions needs to be installed. Deploying these extensions can be done a number of ways including WDS and WSUS. However if you don’t have WDS configured updating clients with WSUS can take time we needed a way to do it the moment a computer was connected to the domain so we wrote a login script to do it. This script only works with Windows XP 32 and 64bit however you could easily extend it to work with Server 2003 and Vista.

Continue reading

Netflow Setup with Ntop

I was always surprised when working for an ISP clients would ring and ask why they have gone over their quota. These aren’t home users many of these were major corporations spanning several sites with equipment several of our datacentres. Even in small networks it is important to know what data is traversing your network even if it is just to know who is running bit torrent and slowing everyone’s internet down. But it also has many more uses then that. It is a great way to detect anomalies in your network which most often are caused by Virus/Malware/Trogens all the fun stuff.

Continue reading