Reddit Sysadmin – Telegram
Helping someone gain access to sensitive data: Am I overthinking to refuse providing help?

Mods - Apologies if this is not the best subreddit to post this question. Please lmk if so, and I'll gladly remove my post.

An acquaintance approached me asking for help with recovering some important data from his GF's laptop as she had forgotten the password to it. During the text convo, he casually mentioned that it was his GF's ex's laptop, and she wanted to get access to potential evidence related to the molestation of their (GF and her ex) two daughters by her ex when they were young so she could bring charges against him.

The moment I read it, I refused to help him because I didn't have a good feeling about it. There's no way to know if she was legally the owner of the laptop or just stole it. Besides, if what this person claimed was true, then would I be exposing myself to potential charges by being in possession of explicit content involving children?

This person was very upset at my refusal to proceed with the data recovery effort.

Am I overthinking this?

https://redd.it/1rbdqpj
@r_systemadmin
Weekly 'I made a useful thing' Thread - February 27, 2026

There is a great deal of user-generated content out there, from noscripts and software to tutorials and videos, but we've generally tried to keep that off of the front page due to the volume and as a result of community feedback. There's also a great deal of content out there that violates our advertising/promotion rule, from noscripts and software to tutorials and videos.

We have received a number of requests for exemptions to the rule, and rather than allowing the front page to get consumed, we thought we'd try a weekly thread that allows for that kind of content. We don't have a catchy name for it yet, so please let us know if you have any ideas!

In this thread, feel free to show us your pet project, YouTube videos, blog posts, or whatever else you may have and share it with the community. Commercial advertisements, affiliate links, or links that appear to be monetization-grabs will still be removed.

https://redd.it/1rg2o3y
@r_systemadmin
Does your service desk tier 1 rep know how to change display scaling and how much are you paying them?

Serious question, not a joke. Can you tier 1 (entry/low) rep change display scaling on their window device? How much are you paying them?

Edit: for clarity, our tier 3 service desk is still a help desk rep but a senior level. Someone who can troubleshoot new issues. In traditional tiers this is probably tier 2 or 1.5?

Rant: I am about to cut ties with service desk completely after what was pulled recently. User submitted a ticket with a screenshot stating that they can not access certain web application. Screenshot shows an icon indicating that device must be rotated. It was not solved by tier 1 and escalated to tier 3. Tier 3 reached out to me directly asking for help. I responded with change windows scaling down to 100%. The reply that rep sent was telling end user to click on settings in web application and then change scaling to 100%

This is tier 3 rep, that does not know what changing scaling in windows is or how to do. Instead of trying it or asking for clarification a nonsense note was sent to end user which does not solve anything.

This position is paid 65k a year if I’m not mistaken. For tier 3.

I just lost my will to help…

https://redd.it/1rgs26b
@r_systemadmin
How do y’all handle coworkers that’s just not pulling their weight?

I can get behind competent people slacking since they know how to do the work when it counts but I have a guy that just doesn’t grasp it. Unless google literally spell out the solution or someone walk him through it he wouldn’t get how to begin troubleshooting it.

I wouldn’t mind it as much if I’m not dragged into his tickets so often. Just to figure they never bother research further than calling the vendor .

https://redd.it/1rgs89q
@r_systemadmin
I've made a massive mistake

​

I left a sysadmin role where I was comfortable and had spent five years, and I started a new sysadmin position this week. Almost immediately, I realised I’d made a mistake.

On my first day, I arrived to find an old Acer monitor with no stand, a broken desk phone, and no laptop. After a very brief introduction, I began reviewing the tenant and discovered it was several years old but essentially still in a “straight out of the box” state. There is no documentation, no asset register, and critical infrastructure including hardware and the firewall is end of life.

It quickly became clear that the IT Manager has no understanding of which vendors we use or what services they provide. I was told to start emailing various MSPs to figure out what they handle and was informed that I’d be responsible for managing this going forward.

I put together an eight-page document outlining serious security risks, only to then learn from the CEO that the company was hacked last year. On top of that, they never retrieve equipment from leavers and have no way to track company assets.

I feel like I’ve failed by leaving a great role for this situation, and I’m now facing the possibility of having to restart my job search. I’ve been completely honest with them about how misled I was during the interview process.

There’s also an expectation that I take on multiple, unrelated projects alongside day-to-day sysadmin responsibilities. I was told in the interview that this was a new role and a straightforward sysadmin position. What I later discovered is that another IT manager had previously been doing this job and was dismissed for gross misconduct. Another red flag is that the company doesn’t use job noscript everyone is expected to “wear multiple hats.”

At this point, I’m seriously considering walking out on Monday and looking for something else.


https://redd.it/1rh810e
@r_systemadmin
HELP PLEASE! Had my first real email compromise incident this week. Solo IT Admin. Here's what I did — what did I miss?

Long post, but hopefully useful to someone who ends up in the same situation. TLDR at the bottom.

So this week I dealt with my first legit email compromise at work. I'm the sole IT Admin at an SMB (\~250 mailboxes, \~82 internal users caught in the blast). No team to call on, no senior engineer to escalate to — just me, Google, and a lot of Microsoft docs.

A VP-level exec's M365 account got compromised and the attacker used it to blast malicious OneDrive/SharePoint sharing links to our internal employees and external customers(about 2000 emails sent in total). Because it came from a trusted internal account, a lot of people didn't think twice. It was a bad day.

Here's what I did, roughly in order:



# Containment

First thing — got the VP out of the attacker's hands. Reset the password, revoked all active sessions in Entra ID so they were signed out everywhere immediately. Then I pulled the malicious OneDrive file, killed all the sharing links tied to it, and went digging for inbox rules. Didn't find anything. Also checked to make sure the attacker hadn't registered their own MFA method on the account. Disabled users access to all platforms under my purview in our tech stack.

# Investigation

Pulled Entra ID sign-in logs to figure out where the breach started — looking for weird IPs, unusual locations, off-hours logins. Found some suspicious non employee logins from Miami and Arlington Va. Used Exchange Admin Center to run message traces and figure out how far the malicious emails actually went.

I also checked for OAuth app consents, new device registrations, and any delegated permissions that got added (found nothing).

# Remediation

I used Microsoft Purview Content Search to run a tenant-wide search for every email sent from the compromised account during the attack window. Found 164 malicious messages sitting in 82 mailboxes.

I used powershell to mass purge the emails from all internal users inbox.



# What I'm still trying to figure out / asking for help with

1. What did I miss in the investigation? Are there logs or artifacts I should've pulled that I didn't? I'm thinking about things like shadow inbox rules, deeper delegate access checks, hidden mail flow rules at the org level — anything that could've been left as persistence.

2. Customer notification — where's the line? The malicious links went to external customers too. At what point does this become a legal or compliance notification situation? Has anyone navigated this at an SMB level without a legal team on staff?

3. CA policy baselines? Anyone have a solid Conditional Access policy structure they'd recommend for an SMB M365 environment? Especially around admin accounts and high-risk sign-in handling.

5. Defender plan — what do I actually need? What's the minimum plan you'd want for real incident response tooling at this size? Is Defender for Business worth the jump?

6. How do you validate you actually got everything? Post-incident, how do you confirm there's no persistence left — hidden OAuth tokens, mail rules, rogue device enrollments? I feel like I got the obvious stuff but I'm not fully confident.

Anything else I should be looking out for or worried about? Anyway to tell how the attacker entered her accounts or gained access or track what they may have done while they had access to her credentials? This is giving me anxiety, some of our partners and customers are in a uproar.

TLDR: VP account got compromised, attacker sent malicious OneDrive links to \~82 internal mailboxes and external customers and partners. Reset/revoked the account, investigated logs, used PowerShell to purge 164 malicious emails across the org. Solo admin, first time doing this for real. What would you have done differently and what should I be doing next?

https://redd.it/1rhaevx
@r_systemadmin
OpenClaw is going viral as a self-hosted ChatGPT alternative and most people setting it up have no idea what's inside the image

Got OpenClaw running two weeks ago. Claude and GPT through my own Telegram, no third party routing, exactly what I wanted. Pulled the image, followed a guide, done.

Then I actually looked at what I pulled.

Official GHCR image has \~2k CVEs. 7 critical. Several with no patch available at all. The 1panel build is basically identical. Alpine/openclaw sounds like it should be minimal, it's not even Alpine, it's Debian 12 underneath with 1,156 vulnerabilities. Check yourself: docker run --rm alpine/openclaw cat /etc/os-release

Here's what makes this different from running any other bloated container. OpenClaw directly edits local files and executes system commands. It needs unrestricted machine access to function. ChatGPT runs sandboxed. This doesn't. So whatever image you pulled has your WhatsApp, your API keys, your filesystem, and 2,000 unpatched CVEs.

I'm not running it anymore until I find something cleaner. Has anyone found an image that's actually been stripped down, same functionality...?

https://redd.it/1rg2kc1
@r_systemadmin
1 month with Ubiquiti (so far)

We recently started testing with Ubiquiti to replace an existing Meraki deployment. After a very small test, we replaced about 30% of our APs with Ubiquiti APs. Then, we replaced two 48-port access switches with Ubiquiti switches. We have a small environment with only 2 physical sites, about 75 APs, 1 core switch, and about 15 48-port access switches. We are using self-hosted Unifi OS running on Rocky Linux 10 on Proxmox.

So far:

\--We noticed an issue with a single wireless client. It was a very old Android phone, and for whatever reason, it repeatedly connected and disconnected (once about every 2 seconds). The "solution" was to disable the 6 GHz radio for that one SSID; we honestly don't know why this "fixed" it. And it may not be a Ubiquiti-specific issue because this was the first 6 GHz radio we ever had in our environment. Eventually, we will turn on the radio again.

\--We had some weird intermittent client connection issues with the switches. We quickly reverted back to Meraki for these. We probably could have spent more time and energy on it and possibly fixed it, but it was just too much to deal with at the time. The issue did not occur in the lab testing, so I am not sure what it is. We may revisit it.

So our overall direction right now: use Ubiquiti for APs, not switches. This could change in either direction over time. I'll post again in a few months.

https://redd.it/1rhcdko
@r_systemadmin
Stale trust still showing up on other DCs after deletion

Good Morning!

Back many moons ago, my predecessor created a secondary domain to use for Exchange. He built the Exchange server AND DC as one server. This is the only server in this domain and it has been offline now for about three years. However I still see the Trust relationship in the Active Directory Domains and Trusts GUI. The Trust looks like this:

"Domains trusted by this domain (outgoing trusts)":

Domain Name "companyB.com"
Trust Type - Forest
Transitive - Yes

"Domains that trust this domain (incoming trusts)":

Domain Name - "CompanyB.com"
Trust Type - Forest
Transitive - Yes

I've deleted the trust via Active Directory Domains and Trusts GUI.

However, 30 minutes later, if I use the above tool to connect to my other DCs, It still appears, and when I click on the trust and properties I receive this error: ""A trusted domain object cannot be found for the trust to domain (olddomain). The trust may have been removed by another user." The remove button is greyed out.

I've forced replication using repadmin /syncall /APeD

If I open up adsiedit.msc, and connect to my current domain, I cannot find the old trust object under CN=-System to delete. Am I looking in the wrong place?



I still have access to the old DC for the no longer needed domain and trust. It's been powered off for several years. Should I simply turn it back on, recreate the trust on my current domain, then delete the trust while the old DC is active?





Thank you!

https://redd.it/1rh7cp0
@r_systemadmin
Network Solutions - Any success with DKIM for your companies Domain

I inherited a big mess with company email hosted at Network Solutions, but DNS hosted elsewhere. The split support isn't really a problem, just a pain.


I'm trying to implement DKIM aligned with our company domain. Emails have valid DKIM applied by Vade/OX, but of course that won't pass DMARC.


I won't bother relating the support horror story, I just would like to know if anybody has successfully setup DKIM for your own domain to use with Network Solutions Professional Mail.

https://redd.it/1rhbkwy
@r_systemadmin
Philips 34B1U5600CH – Does USB-C + HDMI work in 50/50 PBP with hardware KVM (no software)?

Does anyone own the Philips 34B1U5600CH and use USB-C (with power delivery) + HDMI simultaneously in 50/50 PBP mode?
Can you confirm the built-in KVM lets you switch keyboard/mouse between both inputs using only the monitor’s OSD, with no software installed?

https://redd.it/1rhgxxb
@r_systemadmin
CMMC L2

My org is starting to look at getting to CMMC L2 and there have been a lot of changes being made to make sure we achieve it by the end of the year.

Curious about other sysadmins who have been through this and what works and what doesn’t? I’m curious what pitfalls there are and how to avoid them.

https://redd.it/1rhimas
@r_systemadmin
Why do users insist on using work email for personal tasks?

It just makes no sense to me that I get people complaining about trying to send or receive emails when it has no work value at all. For example, one person was supposed to receive an email from their kid’s school about updated schedules but never did because it got caught in a spam filter that they could have checked themselves.

Why should I be dedicating resources to an issue that only affects their personal life, and why can’t they be bothered to have a personal email account?

https://redd.it/1rhk0xh
@r_systemadmin
Would a lightweight PAM / password rotation tool for <500 devices be useful?

Hi sysadmins,

I’m a developer working on a lightweight Privileged Access Management (PAM) / password rotation solution aimed at organizations managing fewer than 500 devices, and I’d really value some real-world feedback before going further.

The goal is to build something simpler and more affordable than enterprise PAM tools, but still reliable enough for production use.

Current ideas include:

• Reset and verify passwords for Active Directory and local machine accounts

• Automatic device discovery on the network

• Agent-based password rotation for devices that are not always connected (like laptops)

• Password vaulting and secure sharing

• Full audit logs for all password-related actions

• Verification that password changes actually succeeded on the device

• Managing credentials even when machines are off-network or remote

Target environment:

• Small and mid-size organizations

• Internal IT teams (not MSP-focused)

• Roughly 50–500 devices

I’m trying to understand:

• Would a tool like this be useful in your environment?

• What features would be must-have vs nice-to-have?

• What do current PAM tools do poorly?

• Would you consider buying a simple, reasonably priced solution in this space?

I’m especially interested in hearing from admins managing small-to-mid environments, where enterprise PAM tools feel too heavy or expensive.

Happy to chat 1-on-1 if anyone is interested — feel free to DM.

Thanks.

https://redd.it/1rhnirl
@r_systemadmin
My "I've made a massive mistake" moment

Reading another post on this sub reminded me of my own "I've made a massive mistake" moment - https://www.reddit.com/r/sysadmin/s/G7BjVaBkzy

I was a service desk analyst at a medium size organisation. The company overall was good to work for, and paid on the higher end for a service desk analyst in the area.

I had been with them for at least 3 years and I really wanted to get into a system administrator or network administrator role. Problem was all the people in these roles already were comfortable there and weren't going to be resigning anytime soon. The company also wasn't expanding, so there wouldn't really be any newly created roles. It would be potentially years before I would get into one of these roles at this company.

I start applying for other system administrator and network administrator roles, and eventually interview at another company as a system administrator.

Interview went well. We discussed why I wanted to leave my current role and I explain why, and discuss salary which was only slightly higher than my current salary, around 5% higher.

Although it would have been nicer to make a higher salary, it was at least getting into a role I wanted, and I didn't exactly have a huge amount of experience that wasn't service desk, so they offered and and I accepted the role.

I start my first day there. They tell me that everyone new in IT there starts out in service desk for 3 months. This was to get familiar with their systems, processes and business overall.

I was a little annoyed considering that I took this role to get out of service desk and that this wasn't mentioned in the interview, but fair enough. It was only for 3 months, so whatever, I'll just stick it out for 3 months.

Being new to the job, I do my job as good as I can. Every ticket is done well, has all the correct information, if it needs to be escalated has everything the team being escalated to needs including all troubleshooting, screenshots, etc.

My first pay came and I notice that it is quite a bit lower than what it should be. I check my payslip and it mentions my yearly salary at about 70% of what the salary in the interview was discussed.

The next day I raise this with my manager, politely mentioning there must have been an error when my pay was setup with HR or something.

He mentions that pay is what they pay their service desk analysts, so it is correct, but once I start as a system administrator it will become the wage discussed in the interview.

I was super annoyed at this, especially considering it's substantially less pay than the job I resigned from. I tell myself it's only for 3 months, just wait it out.

3 months comes up, then 3 and a half months comes up, and I'm still in service desk at this 70% of the agreed upon wage.

On the day of being there for 4 months I mention to my boss that it was discussed that everyone starts in service desk for 3 months, it's now been 4 months, and ask when I would be moving to my system administrator role.

He mentions funny I should bring that up, management were just discussing that. They had noticed that I have done really well in the service desk role. As such, they decided that they want to keep me there, and they would be moving another one of the service desk guys into the system administrator role.

To say I was livid at this would be an understatement, but I just put on a happy face. I knew at that moment I wanted nothing more to do with this company.

That night, I started applying at other companies and within a month, I had another offer as a system administrator elsewhere.

When I resigned, it was basically surprised Pikachu face with them. They couldn't understand why I was resigning after only 5 months in.

https://redd.it/1rhpifn
@r_systemadmin
Adobe Premiere Pro Error Code 0xc0000142

Hi, I have this error and I don’t know how to fix it. I’ve tried everything — reinstalling C++, running it in Windows 8 compatibility mode — but nothing works. The error doesn’t even show up in Event Viewer. Does anyone have a solution, please?

https://redd.it/1rhuoux
@r_systemadmin
Anyone here running a private USA RDP instead of shared/cloud setups? Worth it long term?

I’m testing a private USA-based Windows RDP setup and trying to figure out if it actually makes sense long term.

The plans I’m looking at are roughly in the $26–$75/mo. range depending on resources.
Example specs I’m comparing:

• 2–4 vCPU (3.4GHz range)
• 4–32GB RAM
• 50–200GB SSD
• 1–5TB bandwidth
• 1Gbps port + dedicated IP
• Full admin access on Windows Server

Main use case would be running browser-based workflows and some SEO tools, so stability and consistent performance matter more than raw power.

For those who’ve used private RDP setups in the US:

– Does dedicated IP + full admin access actually make a noticeable difference?
– Any hidden bandwidth or performance bottlenecks I should watch for?
– At what point does it make more sense to jump to full dedicated hardware instead?

Not selling anything, just trying to understand real-world experience before locking into a plan.

https://redd.it/1rhwncp
@r_systemadmin
Will California age-attestation law impact device imaging and deployment?

On January 1, 2027, California Assembly Bill No. 1043 will come into effect. The law requires every operating system provider in California to collect age information from users at account setup. This includes Windows, Linux, macOS, iPadOS, etc.

For Windows computers, if we currently have an unattend file to answer the OOBE questions, will we have to add a new question/answer to the file? And how the fuck do we answer it if there is some possibility that an under-18 user *could* use the device? Or even worse, is it going to end up being a question that cannot be automatically answered and must be manually answered? How would a library with shared public kiosk computers answer this age question? Will Autopilot now require the question to be answered?

Same for iPad's: we have the OOBE questions auto-answered currently so that setting up a new iPad kiosk is quick and easy. Is this law going to change that?

https://redd.it/1rhx04k
@r_systemadmin
Best SASE options in 2026?

We're a small team, mostly remote, mix of mac and PC. Currently using a basic VPN and separate DNS filtering, but it's becoming a pain to manage two tools for what feels like it should be one solution. Looking at SASE as the logical next step.

From what I understand, SASE combines SD-WAN with cloud-delivered security (firewall, SWG, CASB, ZTNA, etc) into a single platform. The appeal is obvious. One vendor, one dashboard, fewer headaches.

I've looked at a few options:

Cloudflare One seems well-regarded and has a generous free tier. Wondering if it scales reasonably for SMB without jumping to enterprise pricing.
Zscaler comes up constantly in recommendations, but feels more enterprise-focused. Is it overkill for a small team?
Cato Networks appears to be built with mid-market in mind, which is appealing. Less familiar with how it performs in practice.
Netskope gets good reviews around data protection specifically, but unclear on pricing and complexity for a smaller shop.

A few things I'm trying to figure out. Is there a meaningful difference between these for a team under 25 users, or do they mostly converge at that scale? Are any of these reasonably self-managed, or do they all assume you have a dedicated IT person? Is there an all in one that handles DNS filtering, VPN replacement, and basic DLP without needing add-ons?

Not looking for the most feature-rich option. Just something solid, manageable, and priced for SMB. Open to guidance from anyone who's actually deployed one of these.

https://redd.it/1ri1lwz
@r_systemadmin