NATIONAL: Just a fun article on how basic technical and networking tools can help an information technology help desk to recover a stolen automobile and laptop.
The call could come in like this:
“Yeah, Hello? Yeah I had my company car stolen.”
Okay, thank you for confirming your identification.
Was your automobile lo-jacked? “No.”
Okay, when you are done with your laptop do you power it down or just close the lid?
When an automobile is lost or stolen, and there is a laptop within the car is on but not logged out, that piece of equipment may still be on a network. If the laptop is on a network the equipment must report in from time to keep logged in and authenticated on a secure network.
Obviously from a security stand point
Step 1: Using Microsoft Server