Techies — how are you storing and managing all your cables, adapters, and peripherals at home?
Hey all,
Looking for some inspiration for cable and tech accessory storage at home — not the usual under-desk cable trays or conduit stuff, but more about how you store all the spare cables, adapters, chargers, and random tech bits that seem to multiply over time.
I’ve got everything from USB-C, HDMI, and power cables to hubs, adapters, and peripherals — basically a tech drawer that’s turned into chaos. I’m thinking of making a small storage area in a spare room or bedroom, but I want something clean, organised, and modern-looking — not just plastic tubs stacked everywhere.
So I’m curious:
What are you using — drawer systems, clear boxes, pegboards, label setups?
Are you going for something like an IKEA or tool-chest style drawer system (like for garage tools but for cables)?
Do you label each cable type or just bundle and group them?
Any cool or clever DIY ideas you’ve tried?
I’d love to see photos or links to setups that work for you — especially if you’ve made it look neat enough for a home office or bedroom rather than a workshop.
https://redd.it/1oggtny
@r_systemadmin
Hey all,
Looking for some inspiration for cable and tech accessory storage at home — not the usual under-desk cable trays or conduit stuff, but more about how you store all the spare cables, adapters, chargers, and random tech bits that seem to multiply over time.
I’ve got everything from USB-C, HDMI, and power cables to hubs, adapters, and peripherals — basically a tech drawer that’s turned into chaos. I’m thinking of making a small storage area in a spare room or bedroom, but I want something clean, organised, and modern-looking — not just plastic tubs stacked everywhere.
So I’m curious:
What are you using — drawer systems, clear boxes, pegboards, label setups?
Are you going for something like an IKEA or tool-chest style drawer system (like for garage tools but for cables)?
Do you label each cable type or just bundle and group them?
Any cool or clever DIY ideas you’ve tried?
I’d love to see photos or links to setups that work for you — especially if you’ve made it look neat enough for a home office or bedroom rather than a workshop.
https://redd.it/1oggtny
@r_systemadmin
Reddit
From the sysadmin community on Reddit
Explore this post and more from the sysadmin community
W11 license to install on Parallels
Anyone can give me some pointers on this? Have someone with Mac and they need Windows 11 for their job. They have M365 Business Premium license as well. Any recommendations on sourcing W11 license besides Microsoft Store?
thanks!
https://redd.it/1ogj4o7
@r_systemadmin
Anyone can give me some pointers on this? Have someone with Mac and they need Windows 11 for their job. They have M365 Business Premium license as well. Any recommendations on sourcing W11 license besides Microsoft Store?
thanks!
https://redd.it/1ogj4o7
@r_systemadmin
Reddit
From the sysadmin community on Reddit
Explore this post and more from the sysadmin community
Critical BIND9 DNS Cache Poisoning Vulnerability CVE-2025-40778 - 706K+ Instances Affected, PoC Public
Heads up sysadmins - critical BIND9 vulnerability disclosed.
Summary:
- CVE-2025-40778 (CVSS 8.6)
- 706,000+ exposed BIND9 resolver instances vulnerable
- Cache poisoning attack - allows traffic redirection to malicious sites
- PoC exploit publicly available on GitHub
- Disclosed: October 22, 2025
Affected Versions:
- BIND 9.11.0 through 9.16.50
- BIND 9.18.0 to 9.18.39
- BIND 9.20.0 to 9.20.13
- BIND 9.21.0 to 9.21.12
Patched Versions:
- 9.18.41
- 9.20.15
- 9.21.14 or later
Technical Details:
The vulnerability allows off-path attackers to inject forged DNS records into resolver caches without direct network access. BIND9 accepts unsolicited resource records that weren't part of the original query, violating bailiwick principles.
Immediate Actions:
1. Patch BIND9 to latest version
2. Restrict recursion to trusted clients via ACLs
3. Enable DNSSEC validation
4. Monitor cache contents for anomalies
5. Scan your network for vulnerable instances
Source: https://cyberupdates365.com/bind9-resolver-cache-poisoning-vulnerability/
Anyone already patched their infrastructure? Would appreciate hearing about deployment experiences.
https://redd.it/1ogjvq9
@r_systemadmin
Heads up sysadmins - critical BIND9 vulnerability disclosed.
Summary:
- CVE-2025-40778 (CVSS 8.6)
- 706,000+ exposed BIND9 resolver instances vulnerable
- Cache poisoning attack - allows traffic redirection to malicious sites
- PoC exploit publicly available on GitHub
- Disclosed: October 22, 2025
Affected Versions:
- BIND 9.11.0 through 9.16.50
- BIND 9.18.0 to 9.18.39
- BIND 9.20.0 to 9.20.13
- BIND 9.21.0 to 9.21.12
Patched Versions:
- 9.18.41
- 9.20.15
- 9.21.14 or later
Technical Details:
The vulnerability allows off-path attackers to inject forged DNS records into resolver caches without direct network access. BIND9 accepts unsolicited resource records that weren't part of the original query, violating bailiwick principles.
Immediate Actions:
1. Patch BIND9 to latest version
2. Restrict recursion to trusted clients via ACLs
3. Enable DNSSEC validation
4. Monitor cache contents for anomalies
5. Scan your network for vulnerable instances
Source: https://cyberupdates365.com/bind9-resolver-cache-poisoning-vulnerability/
Anyone already patched their infrastructure? Would appreciate hearing about deployment experiences.
https://redd.it/1ogjvq9
@r_systemadmin
CyberUpdates365
BIND 9 Vulnerability CVE-2025-40778 Affects 706,000+ Instances - CyberUpdates365
BIND 9 vulnerability CVE-2025-40778 affects 706,000+ resolver instances worldwide. CVSS 8.6 cache poisoning flaw allows traffic redirection.
Just inherited a network. No documentation. The admin password is "Password123".
Started a new gig as the "sole IT guy" for a 150-employee company.
The previous admin left 3 weeks ago with zero notice. Today was my first day.
There is no documentation. No network diagrams. No asset list. No password manager.
I spent my morning in the "server room" (a hot closet with a single, dusty rack) trying to trace cables.
The good news: I finally got into the domain controller. The bad news: I got in by guessing. The domain admin password was, I kid you not, "Password123".
It hasn't been changed since the server (a physical 2012 R2 box) was set up.
There are no backups, just an external USB drive plugged into the back of the server with a "Last Modified" date of 2019.
On the bright side, I guess I have job security.
What's the worst thing you've ever inherited on Day 1? I need to feel better about this.
https://redd.it/1ogo9eg
@r_systemadmin
Started a new gig as the "sole IT guy" for a 150-employee company.
The previous admin left 3 weeks ago with zero notice. Today was my first day.
There is no documentation. No network diagrams. No asset list. No password manager.
I spent my morning in the "server room" (a hot closet with a single, dusty rack) trying to trace cables.
The good news: I finally got into the domain controller. The bad news: I got in by guessing. The domain admin password was, I kid you not, "Password123".
It hasn't been changed since the server (a physical 2012 R2 box) was set up.
There are no backups, just an external USB drive plugged into the back of the server with a "Last Modified" date of 2019.
On the bright side, I guess I have job security.
What's the worst thing you've ever inherited on Day 1? I need to feel better about this.
https://redd.it/1ogo9eg
@r_systemadmin
Reddit
From the sysadmin community on Reddit
Explore this post and more from the sysadmin community
What are your thoughts on Encrypted DNS (DoH, DoT, DoQ) ?
Hello community,
Long time lurking network engineer/network security engineer here looking for some thoughts from sysadmins.
Standard DNS runs unencrypted over port 53, which means that an eavesdropper can pick up those DNS requests and see which sites your users are visiting, and may potentially use this information to orchestrate cyberattacks against your organisation.
I see there are various attempts at the IETF level to implement encryption for DNS by using either DoH (DNS over HTTPS), DoT (DNS over TLS) or DoQ (DNS over quick).
https://www.internetsociety.org/resources/doc/2023/fact-sheet-encrypted-dns/
https://blog.apnic.net/2018/10/12/doh-dns-over-https-explained/
What are your thoughts on these solutions ? Have you seen these implemented in practice or has your organisation considered deploying them ? If yes, how did it work out, and do you consider the effort worthwhile to improve your organisation's security posture ?
https://redd.it/1ogmvah
@r_systemadmin
Hello community,
Long time lurking network engineer/network security engineer here looking for some thoughts from sysadmins.
Standard DNS runs unencrypted over port 53, which means that an eavesdropper can pick up those DNS requests and see which sites your users are visiting, and may potentially use this information to orchestrate cyberattacks against your organisation.
I see there are various attempts at the IETF level to implement encryption for DNS by using either DoH (DNS over HTTPS), DoT (DNS over TLS) or DoQ (DNS over quick).
https://www.internetsociety.org/resources/doc/2023/fact-sheet-encrypted-dns/
https://blog.apnic.net/2018/10/12/doh-dns-over-https-explained/
What are your thoughts on these solutions ? Have you seen these implemented in practice or has your organisation considered deploying them ? If yes, how did it work out, and do you consider the effort worthwhile to improve your organisation's security posture ?
https://redd.it/1ogmvah
@r_systemadmin
Internet Society
Encrypted DNS Factsheet - Internet Society
The domain name system (DNS) makes the Internet easier for humans to navigate as well as for services online to be highly resilient.
What's the "rookie mistake" you've made dispite your experience?
Let's be honest, we've all made beginner level mistakes that somehow slipped through, even with years of experience.
How did it impact production?
Just a reminder for people who are starting in IT (even for the veterans out there too), that you're going to make mistakes even with years of experience and it's ok.
https://redd.it/1ogsnnx
@r_systemadmin
Let's be honest, we've all made beginner level mistakes that somehow slipped through, even with years of experience.
How did it impact production?
Just a reminder for people who are starting in IT (even for the veterans out there too), that you're going to make mistakes even with years of experience and it's ok.
https://redd.it/1ogsnnx
@r_systemadmin
Reddit
From the sysadmin community on Reddit
Explore this post and more from the sysadmin community
Best way to share service account passwords securely (on-prem only, no cloud tools allowed)
I’ve been looking into ways to securely share service account passwords between admins in an on-prem environment.
Found a few paid solutions (like Password Safe, ManageEngine, etc.), but wondering — are they really worth buying?
Or is this issue not even worth spending money on?
What are you guys using in regulated environments with no cloud access?
Would love to hear some ideas about this.
Thanks,
https://redd.it/1ogudmk
@r_systemadmin
I’ve been looking into ways to securely share service account passwords between admins in an on-prem environment.
Found a few paid solutions (like Password Safe, ManageEngine, etc.), but wondering — are they really worth buying?
Or is this issue not even worth spending money on?
What are you guys using in regulated environments with no cloud access?
Would love to hear some ideas about this.
Thanks,
https://redd.it/1ogudmk
@r_systemadmin
Reddit
From the sysadmin community on Reddit
Explore this post and more from the sysadmin community
Level 1 sd specialist seeking advice
Hey everyone,
I landed a job recently as a level 1 sd specialist. I dont have an IT background.
Let's just say I got served this opportunity on a silver platter. I really don't wanna mess this up.
I was hoping if I could get some general advice from you brainiacs that would help me bring more value and perform better.
Thank you for your time.
https://redd.it/1ogvdvl
@r_systemadmin
Hey everyone,
I landed a job recently as a level 1 sd specialist. I dont have an IT background.
Let's just say I got served this opportunity on a silver platter. I really don't wanna mess this up.
I was hoping if I could get some general advice from you brainiacs that would help me bring more value and perform better.
Thank you for your time.
https://redd.it/1ogvdvl
@r_systemadmin
Reddit
From the sysadmin community on Reddit
Explore this post and more from the sysadmin community
Another M365 Outage?
Located in AUS, currently having the following issues.
\-Slow access to office.com
\-No access to portal.office.com
\-Access to admin.microsoft.com is ok.
Down detector starting to spike
https://downdetector.com.au/status/microsoft-365/
No outages listed in health status
https://status.cloud.microsoft/
https://redd.it/1oh0rmo
@r_systemadmin
Located in AUS, currently having the following issues.
\-Slow access to office.com
\-No access to portal.office.com
\-Access to admin.microsoft.com is ok.
Down detector starting to spike
https://downdetector.com.au/status/microsoft-365/
No outages listed in health status
https://status.cloud.microsoft/
https://redd.it/1oh0rmo
@r_systemadmin
Office
Your Favorite Office Apps—Now Smarter with Copilot
Elevate with Microsoft 365 Copilot—AI at your side to help you create, collaborate, and achieve more across documents, presentations, and data.
How to secure endpoint network traffic without a full tunnel VPN
My company has a lot of remote users who WFH and dont have the best ISP speeds. We want to make sure none of our remote users are susceptible to a MITM attack from some rogue AP when they are traveling. Is there any solution that ensures all network traffic is protected without a full VPN tunnel running on the endpoints?
https://redd.it/1oh198i
@r_systemadmin
My company has a lot of remote users who WFH and dont have the best ISP speeds. We want to make sure none of our remote users are susceptible to a MITM attack from some rogue AP when they are traveling. Is there any solution that ensures all network traffic is protected without a full VPN tunnel running on the endpoints?
https://redd.it/1oh198i
@r_systemadmin
Reddit
From the sysadmin community on Reddit
Explore this post and more from the sysadmin community
Looking for a solid web filtering setup for ~300 users and better AI threat detection
we’ve got around 300ish users spread across a few locations. used to run fortigate with ad based web filtering which worked fine until we started moving systems to azure ad. once a device was azure ad joined it stopped logging into the dc properly, so group based filtering stopped working.
we switched to meraki mx for SD-WAN and tried the Ad integration for content filtering. It started spamming our domain controllers with WMI calls and slowed everything down, so that plan died fast.
Management now wants a filtering system that still allows exceptions for certain departments like marketing that need social media and a short open window during lunch for general sites.
if there’s a solution that can handle standard web filtering but also tie into AI threat detection or basic AI guardrails, that would be ideal. something that can work with both on prem and azure ad joined machines without slowing performance.
anyone running something like that successfully?
https://redd.it/1oh6sbn
@r_systemadmin
we’ve got around 300ish users spread across a few locations. used to run fortigate with ad based web filtering which worked fine until we started moving systems to azure ad. once a device was azure ad joined it stopped logging into the dc properly, so group based filtering stopped working.
we switched to meraki mx for SD-WAN and tried the Ad integration for content filtering. It started spamming our domain controllers with WMI calls and slowed everything down, so that plan died fast.
Management now wants a filtering system that still allows exceptions for certain departments like marketing that need social media and a short open window during lunch for general sites.
if there’s a solution that can handle standard web filtering but also tie into AI threat detection or basic AI guardrails, that would be ideal. something that can work with both on prem and azure ad joined machines without slowing performance.
anyone running something like that successfully?
https://redd.it/1oh6sbn
@r_systemadmin
Reddit
From the sysadmin community on Reddit
Explore this post and more from the sysadmin community
Qsn about Secure boot Cert in VM
Hi Sysadmins,
I have read all the articles regarding secure boot certificate expiration in physical devices. can you help me with the situation in case of a virtual machines (Vmware or Azure)
My Exact questions are:
1. Are the cert expiration applicable for virtual machines?
2. what are the to-dos in case of that?
https://redd.it/1oh3bwb
@r_systemadmin
Hi Sysadmins,
I have read all the articles regarding secure boot certificate expiration in physical devices. can you help me with the situation in case of a virtual machines (Vmware or Azure)
My Exact questions are:
1. Are the cert expiration applicable for virtual machines?
2. what are the to-dos in case of that?
https://redd.it/1oh3bwb
@r_systemadmin
Weird 6gx and doculink emails hitting our domain
We’ve started seeing a lot of quarantined phishing emails coming through. The sender addresses are really strange. Some start with “/6gx…” followed by a long string of random-ish characters (242 characters, with slashes, plus signs, etc). Others start with “doculink…” and a different random string. Different domains each time.
Feels like these are supposed to trigger something on our domain but are getting blocked instead.
My guess is one of two things:
1. We tightened up DMARC/DKIM recently. Maybe it’s just DMARC doing its job and these are failed encodings getting blocked.
2. Or it’s some kind of noscript injection landing in our global quarantine.
Anyone seen anything like this? Thoughts on what’s actually happening or how to deal with it?
https://redd.it/1oh86jr
@r_systemadmin
We’ve started seeing a lot of quarantined phishing emails coming through. The sender addresses are really strange. Some start with “/6gx…” followed by a long string of random-ish characters (242 characters, with slashes, plus signs, etc). Others start with “doculink…” and a different random string. Different domains each time.
Feels like these are supposed to trigger something on our domain but are getting blocked instead.
My guess is one of two things:
1. We tightened up DMARC/DKIM recently. Maybe it’s just DMARC doing its job and these are failed encodings getting blocked.
2. Or it’s some kind of noscript injection landing in our global quarantine.
Anyone seen anything like this? Thoughts on what’s actually happening or how to deal with it?
https://redd.it/1oh86jr
@r_systemadmin
Reddit
From the sysadmin community on Reddit
Explore this post and more from the sysadmin community
Microsoft heading to Australian Federal Court for misleading 2.7 million Australians.
Microsoft is heading to Australia's Federal Court, with the ACCC alleging the tech giant mislead 2.7 million Australians when they bundled the company's AI assistant, Copilot, into Office 365 and hiked the cost of subnoscriptions.
https://youtube.com/shorts/qZJCuNIZr0w?si=lU-oVgCXTQ_KwVBR
https://redd.it/1oh8yg9
@r_systemadmin
Microsoft is heading to Australia's Federal Court, with the ACCC alleging the tech giant mislead 2.7 million Australians when they bundled the company's AI assistant, Copilot, into Office 365 and hiked the cost of subnoscriptions.
https://youtube.com/shorts/qZJCuNIZr0w?si=lU-oVgCXTQ_KwVBR
https://redd.it/1oh8yg9
@r_systemadmin
YouTube
Microsoft heading to Australia's Federal Court| 9 News Australia
Microsoft is heading to Australia's Federal Court, with the ACCC alleging the tech giant mislead 2.7 million Australians when they bundled the company's AI a...
How are teams automapping container configs to compliance standards like NIST or PCI?
my compliance want runtime evidence that container configs and images should align with frameworks like NIST SP 800 190 or CIS benchmarks. Generating these mappings manually across dozens of microservices is painful and time consuming. I want dashboards that show me where each container stands against specific compliance checks. Anyone know how to auto map containers to frameworks and export audit ready data?
https://redd.it/1ohaj84
@r_systemadmin
my compliance want runtime evidence that container configs and images should align with frameworks like NIST SP 800 190 or CIS benchmarks. Generating these mappings manually across dozens of microservices is painful and time consuming. I want dashboards that show me where each container stands against specific compliance checks. Anyone know how to auto map containers to frameworks and export audit ready data?
https://redd.it/1ohaj84
@r_systemadmin
OSDCloud - Offline Imaging Help
Hi All,
I'm trying to figure out an issue creating an OSDCloud USB deployment with an offline image. For whatever reason once I've created the USB using the steps below, the USB drive does not use the offline image/drivers. In my troubleshooting I've noticed that the OSDCloudUSB partition is not mounted. I've tried various WinPE drivers, including the Intel Rapid Storage driver, different devices, different external drives, but I cannot get the partition mounted. Which I assume will be needed for WinPE to see the offline images.
Diskpart and all related commands don't pick up the external storage either.
There's a chance I'm just missing a step, but for the life of me I cannot work it out. Or completely misunderstanding the documentation.
Below are the steps I was following last week to get the USB created. Hopefully not missed a step from memory.
1. Creating a new workspace from a template with included WinRE wireless support.
1. `Set-OSDCloudTemplate -Name 'Offline\` -WinRE`
2. I'm then creating my new Workspace
1. `Set-OSDCloudWorkspace -WorkspacePath C:\OSDCloudOffline`
3. Adding all the WinPE drivers to the image
1. `Edit-OSDCloudWinPE -CloudDriver *`
4. I've then gone ahead and added some device specific WinPE USB drivers to try and weed out the issue
1. `Edit-OSDCloudWinPE -DriverPath 'C:\Drivers\'`
5. Added the OS of choice
1. `Update-OSDCloudUSB -OS`
6. Added device specific drivers
1. `Update-OSDCloudUSB -DriverPack Dell`
7. Then finally. Create the USB.
1. `New-OSDCloudUSB`
8. I can see all the files, drivers, OS images on the OSDCloudUSB partition of the USB
I am aware there are other solutions for offline image servicing like FFU, but currently testing all the solutions available to me.
Any help/tips/advice would be greatly appreciated.
Thanks!
https://redd.it/1oha0bb
@r_systemadmin
Hi All,
I'm trying to figure out an issue creating an OSDCloud USB deployment with an offline image. For whatever reason once I've created the USB using the steps below, the USB drive does not use the offline image/drivers. In my troubleshooting I've noticed that the OSDCloudUSB partition is not mounted. I've tried various WinPE drivers, including the Intel Rapid Storage driver, different devices, different external drives, but I cannot get the partition mounted. Which I assume will be needed for WinPE to see the offline images.
Diskpart and all related commands don't pick up the external storage either.
There's a chance I'm just missing a step, but for the life of me I cannot work it out. Or completely misunderstanding the documentation.
Below are the steps I was following last week to get the USB created. Hopefully not missed a step from memory.
1. Creating a new workspace from a template with included WinRE wireless support.
1. `Set-OSDCloudTemplate -Name 'Offline\` -WinRE`
2. I'm then creating my new Workspace
1. `Set-OSDCloudWorkspace -WorkspacePath C:\OSDCloudOffline`
3. Adding all the WinPE drivers to the image
1. `Edit-OSDCloudWinPE -CloudDriver *`
4. I've then gone ahead and added some device specific WinPE USB drivers to try and weed out the issue
1. `Edit-OSDCloudWinPE -DriverPath 'C:\Drivers\'`
5. Added the OS of choice
1. `Update-OSDCloudUSB -OS`
6. Added device specific drivers
1. `Update-OSDCloudUSB -DriverPack Dell`
7. Then finally. Create the USB.
1. `New-OSDCloudUSB`
8. I can see all the files, drivers, OS images on the OSDCloudUSB partition of the USB
I am aware there are other solutions for offline image servicing like FFU, but currently testing all the solutions available to me.
Any help/tips/advice would be greatly appreciated.
Thanks!
https://redd.it/1oha0bb
@r_systemadmin
Reddit
From the sysadmin community on Reddit
Explore this post and more from the sysadmin community
security team handed us 600 vulns to fix. half werent even reachable from internet
Infosec ran their quarterly scan and dropped 600 vulnerabilities on us. 200 marked critical. Leadership wants remediation timeline by Friday.
Spent two days triaging with DevOps. Most criticals were libraries we import but never actually call. Internal APIs behind VPN flagged as publicly exposed. Staging environments with test data treated same as production.
Best one was a critical vuln in a Lambda that runs once a month. Scanner sees vulnerable package but has no idea if the code even executes or if anyone hits that endpoint.
Asked security how to prioritize. They said fix criticals first. Cool, but which ones are actually exploitable versus sitting in unused code? Scanner can't tell the difference.
Devs are ignoring security findings now because we've cried wolf too many times. Then we miss actual issues buried under the noise.
We spent half our sprint on vulnerabilities that didn't matter. Meanwhile an actual exploit attempt last month took 8 hours to detect because buried under 300 false positives.
Security team is mad we're not moving fast enough. We're mad they can't tell us what actually needs fixing versus theoretical risk.
Has anyone solved this or do security and engineering just hate each other everywhere?
https://redd.it/1ohcjl6
@r_systemadmin
Infosec ran their quarterly scan and dropped 600 vulnerabilities on us. 200 marked critical. Leadership wants remediation timeline by Friday.
Spent two days triaging with DevOps. Most criticals were libraries we import but never actually call. Internal APIs behind VPN flagged as publicly exposed. Staging environments with test data treated same as production.
Best one was a critical vuln in a Lambda that runs once a month. Scanner sees vulnerable package but has no idea if the code even executes or if anyone hits that endpoint.
Asked security how to prioritize. They said fix criticals first. Cool, but which ones are actually exploitable versus sitting in unused code? Scanner can't tell the difference.
Devs are ignoring security findings now because we've cried wolf too many times. Then we miss actual issues buried under the noise.
We spent half our sprint on vulnerabilities that didn't matter. Meanwhile an actual exploit attempt last month took 8 hours to detect because buried under 300 false positives.
Security team is mad we're not moving fast enough. We're mad they can't tell us what actually needs fixing versus theoretical risk.
Has anyone solved this or do security and engineering just hate each other everywhere?
https://redd.it/1ohcjl6
@r_systemadmin
Reddit
From the sysadmin community on Reddit
Explore this post and more from the sysadmin community
Are we automating enterprise service desks into a corner? The weird paradox nobody's talking about
I've been thinking about something that doesn't quite add up in the IT support world right now.
Everyone's racing to implement AI-driven service desks. The numbers look incredible - ticket deflection rates hitting 53%, resolution times dropping from 30 hours to under 15, costs per ticket potentially falling to near-zero for routine stuff. On paper, this is exactly what we need.
But here's what's bugging me: we're also seeing data that employees are losing 10+ workdays per year to tech issues, and 46% report losing more than three hours weekly to tech problems. If automation is working so well, why are people more frustrated than ever?
I think we've created this weird paradox where we're optimizing for speed and deflection rates, but we're not measuring the actual experience. Like, yeah, your chatbot resolved my ticket in 3 seconds by sending me a knowledge base article I'd already tried. Ticket closed, metrics look great, but my laptop still won't connect to the VPN and now I've wasted 20 minutes in a loop.
The thing that really gets me is how we talk about AI "freeing up agents for complex issues" while simultaneously pushing more users toward self-service. What happens when everyone who actually needs a human can't get through because they're stuck in automated triage? Some research I saw mentioned that only 12% of organizations see actual ROI from self-service investments, which feels about right based on what I'm seeing.
Don't get me wrong. I'm not anti-automation. Password resets and basic provisioning absolutely should be automated. But it feels like we're so focused on the "shift-left" movement that we've forgotten some problems legitimately need the right-shift to skilled humans who can actually solve them.
Has anyone else noticed this? Are your service desks getting simultaneously faster and worse, or is it just the places I'm seeing?
https://redd.it/1ohcpy2
@r_systemadmin
I've been thinking about something that doesn't quite add up in the IT support world right now.
Everyone's racing to implement AI-driven service desks. The numbers look incredible - ticket deflection rates hitting 53%, resolution times dropping from 30 hours to under 15, costs per ticket potentially falling to near-zero for routine stuff. On paper, this is exactly what we need.
But here's what's bugging me: we're also seeing data that employees are losing 10+ workdays per year to tech issues, and 46% report losing more than three hours weekly to tech problems. If automation is working so well, why are people more frustrated than ever?
I think we've created this weird paradox where we're optimizing for speed and deflection rates, but we're not measuring the actual experience. Like, yeah, your chatbot resolved my ticket in 3 seconds by sending me a knowledge base article I'd already tried. Ticket closed, metrics look great, but my laptop still won't connect to the VPN and now I've wasted 20 minutes in a loop.
The thing that really gets me is how we talk about AI "freeing up agents for complex issues" while simultaneously pushing more users toward self-service. What happens when everyone who actually needs a human can't get through because they're stuck in automated triage? Some research I saw mentioned that only 12% of organizations see actual ROI from self-service investments, which feels about right based on what I'm seeing.
Don't get me wrong. I'm not anti-automation. Password resets and basic provisioning absolutely should be automated. But it feels like we're so focused on the "shift-left" movement that we've forgotten some problems legitimately need the right-shift to skilled humans who can actually solve them.
Has anyone else noticed this? Are your service desks getting simultaneously faster and worse, or is it just the places I'm seeing?
https://redd.it/1ohcpy2
@r_systemadmin
Reddit
From the sysadmin community on Reddit
Explore this post and more from the sysadmin community
Some questions about self hosted Snipe IT
We've just recently lost the asset section of FreshService due to budget cuts. We still have everything else in FreshService, just missing the asset part.
Honestly, at first, I was going to create my own (terrible) asset system and have it hosted on one of our VMs and use Azure Runbook Invoke requests to get the client devices to create and update html files. Our budget for this is virtually 0.
But I then had a look at some free options and SnipeIT looks great. It does seem to have "too many" features though. Only thing we really need is these fields:
Device Name
Model
Serial Number
Location
Assigned User
Last Logged in user
Status
It would be ideal (Although not necessary) if each asset had it's own page which I believe SnipeIT does.
We also need some way to link the assets back to the tickets in FreshService. Even if it's just a bunch of hyperlinks in one of the tabs on the asset page.
Also, probably a very stupid question, but how easy is the API to use? And, because it's self hosted, api calls are unlimited, right? Most of the time, we'll be getting the devices themselves to add and update the data on Snipe, most likely through PowerShell API calls.
https://redd.it/1ohbyjo
@r_systemadmin
We've just recently lost the asset section of FreshService due to budget cuts. We still have everything else in FreshService, just missing the asset part.
Honestly, at first, I was going to create my own (terrible) asset system and have it hosted on one of our VMs and use Azure Runbook Invoke requests to get the client devices to create and update html files. Our budget for this is virtually 0.
But I then had a look at some free options and SnipeIT looks great. It does seem to have "too many" features though. Only thing we really need is these fields:
Device Name
Model
Serial Number
Location
Assigned User
Last Logged in user
Status
It would be ideal (Although not necessary) if each asset had it's own page which I believe SnipeIT does.
We also need some way to link the assets back to the tickets in FreshService. Even if it's just a bunch of hyperlinks in one of the tabs on the asset page.
Also, probably a very stupid question, but how easy is the API to use? And, because it's self hosted, api calls are unlimited, right? Most of the time, we'll be getting the devices themselves to add and update the data on Snipe, most likely through PowerShell API calls.
https://redd.it/1ohbyjo
@r_systemadmin
MS365 admin panel down? Also the status page.
Hi, anyone else not able to get to the MS365 admin panel?
Also tried to go to: https://status.cloud.microsoft and check the status from there and it fails too.
I'm in the Northeast of the US.
Edit 10:05 EST: Downdetector is showing a lot of outage reports this morning, for what it's worth.
https://downdetector.com/status/microsoft-365/
Edit2 10:54 EST: Did some digging and it looks like MS is transitioning from admin.microsoft.com to admin.cloud.microsoft.com (new domain scheme for all the online infrastructure).
Anyone having any issues connecting should clear their cache (signing out of the portal) and then try connecting/logging in again. I'm in now. I bet a lot of the Downdetector reports are encountering the same thing. Gotta love MS rolling changes...
https://redd.it/1ohd8vm
@r_systemadmin
Hi, anyone else not able to get to the MS365 admin panel?
Also tried to go to: https://status.cloud.microsoft and check the status from there and it fails too.
I'm in the Northeast of the US.
Edit 10:05 EST: Downdetector is showing a lot of outage reports this morning, for what it's worth.
https://downdetector.com/status/microsoft-365/
Edit2 10:54 EST: Did some digging and it looks like MS is transitioning from admin.microsoft.com to admin.cloud.microsoft.com (new domain scheme for all the online infrastructure).
Anyone having any issues connecting should clear their cache (signing out of the portal) and then try connecting/logging in again. I'm in now. I bet a lot of the Downdetector reports are encountering the same thing. Gotta love MS rolling changes...
https://redd.it/1ohd8vm
@r_systemadmin
downdetector.com
Microsoft 365 down? Current problems and outages
Real-time problems and outages for Office 365. Is the service down? Can't login or connect? Here you see what is going on.
Basic Understanding of SQL Servers?
Fellow sysadmins, how much do you know about SQL? In my role I don't directly work with SQL servers often, but they always seem to come up and occasionally i will have to make changes in a sql db (minor stuff).
What is the best way to get a basic understanding or become the "SQL guy" in a group of folks who don't usually deal with SQL.
TIA
https://redd.it/1ohht45
@r_systemadmin
Fellow sysadmins, how much do you know about SQL? In my role I don't directly work with SQL servers often, but they always seem to come up and occasionally i will have to make changes in a sql db (minor stuff).
What is the best way to get a basic understanding or become the "SQL guy" in a group of folks who don't usually deal with SQL.
TIA
https://redd.it/1ohht45
@r_systemadmin
Reddit
From the sysadmin community on Reddit
Explore this post and more from the sysadmin community