Commit Graph

115 Commits

Author SHA1 Message Date
935b6995e5 sync: auto-sync from HOWARD-HOME at 2026-05-08 19:53:03
Author: Howard Enos
Machine: HOWARD-HOME
Timestamp: 2026-05-08 19:53:03
2026-05-08 19:53:06 -07:00
d019b1e9ad Cascades: ACTION FOR HOWARD - Britney Thompson litigation hold manual check
Exchange REST API still propagating (28 min). Need manual verification via
Exchange Admin Center to unblock HIPAA compliance check.

Instructions provided:
- Access Exchange Admin Center
- Search for Britney Thompson mailbox
- Document litigation hold status (enabled/disabled, date, duration)
- Report findings back in repo

Priority: HIGH - blocks Wave 1 caregiver rollout planning.

HIPAA requirement: §164.308(a)(3)(ii)(C) + §164.316(b)(2)

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
2026-05-08 10:37:34 -04:00
8807b1f168 Cascades: Exchange REST API propagation status - 28 min elapsed
HTTP 401 'invalid_token' still persisting despite correct role assignments.
All Graph API verifications pass - this is Exchange cache propagation delay.

Verified working:
- Exchange Administrator role assigned to Security Investigator SP
- Office 365 Exchange Online app role: dc890d15-9560-4a4c-9b7f-a736ec74ec40
- Token acquisition for investigator-exo tier

Timeline:
- 09:05 AM: Role assigned
- 09:33 AM: Still propagating (28 min elapsed)
- 10:00 AM: Recommended retry (55 min)
- 10:30 AM: Escalation point (85 min)

Blocking: Britney Thompson litigation hold verification for HIPAA compliance.

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
2026-05-08 10:35:15 -04:00
9aab0dc35a cascades: SDM activation root-caused, devices@ provisioning account created
9-hour day on Cascades caregiver phone Shared Device Mode activation.
Root cause of repeated AADSTS50097 was missing Cloud Device Administrator
role -- pilot.test cannot self-register devices for shared mode. Created
dedicated devices@cascadestucson.com (CDA role, MFA on Howard's phone).
Final attempt on Phone A produced an Entra device record with shared-mode
markers (registeredOwners=0, registeredUsers=0). Resume tomorrow by
signing pilot.test in to verify SDM is actually active.

Side wins: ALIS SSO Entra App Registration created (vault commit 90ada33,
blocked on Medtelligent enabling App Store side); 2 of 3 caregiver CA
policies flipped from Report-only to Enforced; kiosk profile bumped to
v13 with full Android nav bar, 12hr inactivity signout, 6-app allowlist
including Company Portal.

Microsoft ticket #2605070040009774 still open.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-05-07 18:38:37 -07:00
6b3ae407bd Add Scileppi Law client folder: Sylvia Mac mini Mail memory diagnosis (Syncro #32262)
New client onboarding for The Law Offices of Chris Scileppi with initial
session log documenting diagnosis on Sylvia's Mac mini (Mac14,3, M2, 8 GB).

Issue: System running out of memory; Apple Mail footprint thrashing the box.
Two Envelope Index rebuild attempts confirmed the mailbox itself exceeds what
8 GB can hold. Disabled Mail at the OS level, moved user to webmail, and
recommended replacement with an M4 Mac mini (16 or 24 GB).

Ticket #32262 resolved. 1 hr onsite logged but deliberately not invoiced.

Files:
- clients/scileppi-law/PROJECT_STATE.md
- clients/scileppi-law/docs/overview.md
- clients/scileppi-law/docs/issues/log.md
- clients/scileppi-law/session-logs/2026-05-07-howard-sylvia-mac-mini-mail-memory.md
2026-05-07 17:11:40 -07:00
2a285d9898 Cascades: MSP app suite onboarding complete
All 5 ComputerGuru apps successfully onboarded:
- Security Investigator, Exchange Operator, User Manager, Tenant Admin, Defender Add-on
- API permissions granted (0 errors)
- Exchange Administrator role assigned to Security Investigator SP

Exchange REST API access pending propagation (15-30 min typical).

Next: Re-test Exchange REST after 09:30 AM MST to verify litigation hold check.

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
2026-05-07 09:10:02 -04:00
1d38cdf8c9 Cascades: Britney Thompson litigation hold check - app onboarding required
Cannot verify litigation hold status - ComputerGuru Security Investigator
app not onboarded to Cascades tenant (HTTP 401 on Exchange REST).

User account confirmed (Britney.Thompson@cascadestucson.com).

Next steps:
- Onboard Security Investigator app to tenant
- Assign Exchange Administrator role
- Re-run litigation hold verification

HIPAA compliance blocker per Howard's 2026-05-06 note.

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
2026-05-07 09:05:45 -04:00
e03e9913d3 IMC1: Memory allocation approval + AD/WSUS clarification
Approved:
- Memory caps: SQLEXPRESS 12GB, WID 512MB, AIMSQL 256MB
- AIMSQL consolidation (pending backup)
- AD is in use, WSUS is not

Howard may proceed with implementation.

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
2026-05-07 09:00:02 -04:00
d63dcde679 sync: auto-sync from HOWARD-HOME at 2026-05-06 15:10:59
Author: Howard Enos
Machine: HOWARD-HOME
Timestamp: 2026-05-06 15:10:59
2026-05-06 15:11:04 -07:00
4da4e5bac5 sync: auto-sync from HOWARD-HOME at 2026-05-06 13:50:24
Author: Howard Enos
Machine: HOWARD-HOME
Timestamp: 2026-05-06 13:50:24
2026-05-06 13:50:25 -07:00
f8c6b4b9ca sync: auto-sync from HOWARD-HOME at 2026-05-06 13:46:20
Author: Howard Enos
Machine: HOWARD-HOME
Timestamp: 2026-05-06 13:46:20
2026-05-06 13:46:23 -07:00
eaae28c201 sync: auto-sync from DESKTOP-0O8A1RL at 2026-05-06 08:02:12
Author: Mike Swanson
Machine: DESKTOP-0O8A1RL
Timestamp: 2026-05-06 08:02:12
2026-05-06 08:02:16 -07:00
95ad40bdbe cascades: document Teams rollout + HIPAA test plan
Lauren Hasselman could not create a Teams group on 2026-05-05.
Diagnostic confirmed the block is at the Teams Admin policy layer
(intentional, gated on HIPAA prerequisites in m365.md issues #12-#14),
not an Entra/M365-Group permissions defect. New teams-rollout.md
captures prerequisites, HIPAA config checklist, canary test plan
(Lauren as primary canary), and exit criteria. Linked from m365.md
issue #14.
2026-05-05 22:01:28 -07:00
c9a47a4ded sync: auto-sync from HOWARD-HOME at 2026-05-05 18:57:19
Author: Howard Enos
Machine: HOWARD-HOME
Timestamp: 2026-05-05 18:57:19
2026-05-05 18:57:20 -07:00
0f3ea95010 sync: auto-sync from HOWARD-HOME at 2026-05-05 18:52:18
Author: Howard Enos
Machine: HOWARD-HOME
Timestamp: 2026-05-05 18:52:18
2026-05-05 18:52:18 -07:00
03d985fe33 sync: auto-sync from HOWARD-HOME at 2026-05-05 18:51:23
Author: Howard Enos
Machine: HOWARD-HOME
Timestamp: 2026-05-05 18:51:23
2026-05-05 18:51:24 -07:00
0f79fdedf4 sync: auto-sync from HOWARD-HOME at 2026-05-05 18:46:49
Author: Howard Enos
Machine: HOWARD-HOME
Timestamp: 2026-05-05 18:46:49
2026-05-05 18:46:49 -07:00
01abf21a1f sync: auto-sync from HOWARD-HOME at 2026-05-05 17:13:15
Author: Howard Enos
Machine: HOWARD-HOME
Timestamp: 2026-05-05 17:13:15
2026-05-05 17:13:16 -07:00
bc39d75304 sync: auto-sync from HOWARD-HOME at 2026-05-05 16:44:25
Author: Howard Enos
Machine: HOWARD-HOME
Timestamp: 2026-05-05 16:44:25
2026-05-05 16:44:26 -07:00
fd8361d0a6 sync: auto-sync from HOWARD-HOME at 2026-05-05 16:31:33
Author: Howard Enos
Machine: HOWARD-HOME
Timestamp: 2026-05-05 16:31:33
2026-05-05 16:31:34 -07:00
45ec03b447 sync: auto-sync from HOWARD-HOME at 2026-05-05 15:00:22
Author: Howard Enos
Machine: HOWARD-HOME
Timestamp: 2026-05-05 15:00:22
2026-05-05 15:00:22 -07:00
b6eb59e8ed Session work 2026-05-04: Grabb Leap calendar fix, Dataforth lobby phone VLAN, IMC printer + VPN
- Grabb & Durando: investigated and resolved Svetlana Larionova's Leap-to-M365 calendar OAuth consent issue (Graph-side report + session log). Syncro #32245.
- Dataforth: lobby phone (ext 201) was offline due to D1-Server-Room port 1 being on the wrong VLAN; reconfigured to VLAN 100, phone re-provisioned and registered. Session log + PROJECT_STATE update. Syncro #32246.
- Instrumental Music Center: Station 2 receipt printer reconnect + VPN install on Manda's machine. Syncro #32247.
- Memory: generalized the Syncro blank-contact rule (was Cascades-only) and added the labor-type rule (never use "Prepaid project labor") per Winter's 2026-05-04 corrections.
- Gitignored `.claude/tmp/` so per-session helper scripts don't sneak in.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-05-04 13:51:59 -07:00
72dab09d3a Session log: Dataforth M365 follow-up investigation - jantar@dataforth.com
Follow-up on three pending items from breach check:
- IdentityRiskyUser scope: consented but requires P2 license
- Dime Client app: internal app requiring verification with Dan Center
- Microsoft Authenticator: drafted upgrade plan and recommendations

Created comprehensive follow-up report with action items.

Machine: Mikes-MacBook-Air
User: Mike Swanson (mike)

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
2026-05-03 15:00:30 -04:00
2e98f95c9f Session log: Dataforth M365 security investigation - jantar@dataforth.com
Darkweb scan follow-up: ran 10-point breach check on jantar@dataforth.com (no IOCs),
revoked eM Client OAuth grant and app role assignment, disabled eM Client SP tenant-wide.
Syncro ticket #109790034 created, billed 1hr prepaid, resolved.

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-05-03 10:37:22 -07:00
72116ed443 Session log: Cascades MHS kiosk fix + SDM bootstrap (mid-flight) + Sombra onboarding side-quest 2026-04-30 19:08:03 -07:00
02e690c6bb Add Sombra Residential LLC client + Server2013 docs
- New clients/sombra-residential/CONTEXT.md (server stub, GuruRMM agent, EOL flag)
- credentials.md: pointer to vault for Administrator password
2026-04-30 14:27:30 -07:00
18e5a467d2 Session log: Cascades CA bypass phased rollout + pilot user + phone re-enroll
Cascades caregiver shared-phone bypass pilot — 2026-04-29 evening into
2026-04-30 early morning continuation.

Major work:
- Adopted phased per-group CA rollout (corrects original tenant-wide §5
  design that would have blocked off-site office users)
- Step A: backfilled admin@ into excludeUsers on all 8 existing Cascades
  CA policies (mirrors sysadmin@ exclusion posture; Option 1 break-glass)
- Outlook + Helpany + LinkRx assigned to Cascades - Shared Phones group
  and added to MHS kiosk app list (final dashboard: 5 caregiver apps)
- Created cloud-only pilot user pilot.test@cascadestucson.com,
  SG-Caregivers-Pilot group, Business Premium license, vault entry
  pushed to Gitea vault repo
- Built 4 CA changes: PATCH legacy all-users-MFA to exclude pilot group,
  CREATE 3 new Report-only policies (block off-network, block
  non-compliant, 8h sign-in frequency) with both admins excluded
- Pilot phone wipe + re-enroll after first attempt stuck; PIN set,
  awaiting MHS to take over launcher and SDM sign-in prompt

6 new project/feedback memories. Resume point at top of new session log.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-30 10:57:28 -07:00
447b90e092 Session log: Cascades audit retention design + Pro-Tech Services email investigation
Cascades:
- Approved Howard's corrected 4-policy CA bypass design
- Caught + fixed policy 3 GDAP bug (Service provider users exclusion)
- Decided hybrid LAW + Storage Account audit retention (ACG-billed,
  reuse existing Trusted Signing Azure subscription, westus2)
- Wrote full audit retention runbook for Howard
- Reshaped break-glass to two accounts (split-storage YubiKeys)
- Documented Cascades M365 admin model (admin@/sysadmin@ Connect-excluded
  by design; local AD Administrator separate identity layer)
- Decided Howard gets Owner on ACG sub with guardrails (resource lock +
  cost alert) instead of per-RG Contributor

Pro-Tech Services:
- DNS recon of pro-techhelps.com + pro-techservices.co
- Diagnosed calendar invite delivery issue (DKIM domain mismatch +
  no DMARC = strict receivers silently drop invites)
- Drafted non-technical IT-provider migration email to Michelle Sora

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-29 17:05:41 -07:00
808d45dda1 Session log: 2026-04-29 Cascades close-out update
Append /save close-out timestamp + commit reference to today's bypass-pilot
Phase B buildout log.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-29 11:05:41 -07:00
f22d33f2ae pavon: session log — OwnCloud VM cron stacking diagnosed and stabilized
Found 75-126 stale `occ system:cron` processes on 172.16.3.22 piling up
since 2026-04-27 due to bad oc_filecache LIKE query against pavon's 257K
camera files. Killed stale procs (load 80 -> 5), wrapped apache crontab
with `flock -n /tmp/oc-cron.lock` to prevent restacking. Per-user
versioning disable rejected by OwnCloud Community (`files_versions`
can't be enabled for groups); workaround `occ versions:cleanup pavon`
identified and deferred. Migration/retention cron deferred per user.
NVR architecture clarified: GeoVision NVRs sync via OC Desktop client
with virtual file placeholders; no direct SMB access to Jupiter.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-29 07:51:21 -07:00
a2f38c1038 cascades: CA unblock + Phase B buildout + onboard-tenant.sh CA Admin backfill
Day-long session unblocking the Cascades CA reconciliation that was paused on
the Tenant Admin SP directory-role gap. Discovered Microsoft also tightened
the OAuth scope for /identity/conditionalAccess/* reads (Policy.Read.All now
required, Policy.ReadWrite.ConditionalAccess no longer accepted for reads).
Patched Tenant Admin manifest accordingly and re-consented in Cascades.

Phase B Intune state turned out to be far more built than the 4/20 log
suggested -- compliance policy, Wi-Fi, device restrictions, both SDM app
configs (Authenticator + Teams), and 7 of 8 apps were already deployed and
assigned. PATCHed device restrictions to block camera/Bluetooth/roaming
and enabled Managed Home Screen multi-app kiosk (ALIS + Teams visible,
10-min auto-signout). PATCHed Cascades named location to add primary WAN
(184.191.143.62/32). Howard added Outlook from Managed Play; SMB encryption
enabled on \CS-SERVER\homes.

CA bypass design corrected -- original §5 plan in user-account-rollout-plan.md
called for "block off-site + MFA on-site" which doesn't match the actual goal
of bypass when network + device assurance present. Reshaped to three policies
that produce on-site-compliant = password only, anything else = MFA or block.

onboard-tenant.sh patched to:
  1. Backfill Policy.Read.All on Tenant Admin SP if missing (idempotent --
     for tenants consented before the 2026-04-29 manifest update).
  2. Assign Conditional Access Administrator directory role to Tenant Admin
     SP at onboard time. Mirrors the Exchange Operator fix Mike landed in
     16f95e8.

Validated with --dry-run against Cascades. Customer-facing tenants already
onboarded should be re-run with this script to backfill both items.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-29 07:32:23 -07:00
8360ea1253 sync: auto-sync from HOWARD-HOME at 2026-04-29 07:19:46
Author: Howard Enos
Machine: HOWARD-HOME
Timestamp: 2026-04-29 07:19:46
2026-04-29 07:19:49 -07:00
b83c024ad2 imc: Manda laptop provision (DESKTOP-KRHQ5TS) + ServerIMC phantom-DC confirmed
- New laptop provisioned onsite at IMC Speedway: joined to imc.local, AD
  account created for Manda (incoming GM), Outlook bound to her M365
  mailbox, Office activated via retail key, AIMsi USER#=4 per Leslie.
- Syncro ticket #32218 invoiced — 1.5 hrs Onsite Business labor debited
  from IMC's prepay block (14.0 -> 12.5 hrs).
- ServerIMC (192.168.0.63) confirmed as a real authentication-degrading
  phantom DC: SRV/A records claim it's a DC; LDAP/Kerberos refuse
  connections. Promoted from "unclear, worth verifying" (2026-04-13) to
  confirmed AD hygiene issue. Was the root cause of the 2026-04-22 remote
  domain-join failure. Needs follow-up ticket: repair or ntdsutil cleanup.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-28 11:10:29 -07:00
00fa539e4f cascades save: AD-side pilot prep done; CA reconciliation blocked on SP role gap (2026-04-28)
Thread 1 (AD-side prep on CS-SERVER) completed:
- howard.enos password reset to memorable value (PHS will sync to M365 once staging exits)
- proxyAddresses=SMTP:howard.enos@cascadestucson.com added (G1 convention)

Thread 2 (CA reconciliation) blocked: ComputerGuru - Tenant Admin SP
(appId 709e6eed-...) has zero directory role assignments in Cascades.
Graph CA endpoints 403 despite Policy.ReadWrite.ConditionalAccess on token.

Decision pending: Path A (Graph-side role assignment via existing
RoleManagement.ReadWrite.Directory) vs Path B (portal click as admin@).
Target role: Conditional Access Administrator
(b1be1c3e-b65d-4f19-8427-f6fa0d97feb9) on SP objectId
a5fa89a9-b735-4e10-b664-f042e265d137.

Follow-up: extend onboard-tenant.sh to assign this role at onboard time
(parallels 16f95e8 Exchange Admin fix for Exchange Operator SP).

Pilot target slipped 2026-04-27 to 2026-04-28. ALIS App Store still
inaccessible — install-side of ALIS SSO still deferred regardless.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-28 07:19:11 -07:00
e0a117b434 client(valleywide): init app modernization project — VB6/Access stack analysis
Initial research session for VWP application modernization. Analyzed 2.7GB
application archive, mapped ~130-table Access 97 schema via binary scan,
confirmed VB6 + P-Code compilation (decompilation viable), and identified
compliance requirements (certified payroll, 3-bank positive pay).

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-04-27 10:10:35 -07:00
3354de1fb1 session log: cascades — Entra Connect install + pilot account prep (2026-04-24/25)
Comprehensive log of the Entra setup work spanning 4/24 evening through 4/25.
Includes a Resume Point at the top so the next session can pick up cleanly.

Highlights:
- Entra Connect Sync installed in staging mode on CS-SERVER, scope OU=Caregivers
- Pilot AD account howard.enos@cascadestucson.com created
- Master plan v2 with explicit drift log (FIDO2/YubiKey injection caught)
- HIPAA retention remediation: 7 mailboxes restored from soft-delete (4/22 deletes
  violated 164.316(b)(2)); termination procedures policy + IR-2026-04-24-001 documented
- admin@cascadestucson.com re-promoted to Global Admin (Sandra Fish cleanup had
  stripped role); residual profile data cleaned
- Existing Cascades CA architecture discovered (Named Location 72.211.21.217 + all-users
  MFA policy from 2026-02-11) — adjusts plan, no duplicate policies needed
- Syncro ticket #32214 'Entra setup' with hidden private rollup (~40-45 billable hrs)

Released session lock; resume point flagged in PROJECT_STATE.md.
2026-04-25 15:38:08 -07:00
b7bc99174f onboard: SANDTEKO MACHINERY LLC (partial) — all apps consented, roles assigned, Exch Op Exchange Admin pending
- tenants.md: updated status to PARTIAL with full detail note
- clients/sandteko-machinery/: new client directory with reports/ and session-logs/ scaffolding

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-04-24 20:13:20 -07:00
db086c3bbf sync: auto-sync from HOWARD-HOME at 2026-04-24 18:11:47
Author: Howard Enos
Machine: HOWARD-HOME
Timestamp: 2026-04-24 18:11:47
2026-04-24 18:11:48 -07:00
5019db4558 sync: auto-sync from HOWARD-HOME at 2026-04-24 14:31:14
Author: Howard Enos
Machine: HOWARD-HOME
Timestamp: 2026-04-24 14:31:14
2026-04-24 14:31:17 -07:00
8419cf2738 docs(kittle): comprehensive DKIM/DMARC setup guide for kittlearizona.com
Created detailed implementation guide for email authentication:
- Step-by-step DKIM enablement in M365
- DKIM CNAME DNS record creation (NSOne/Squarespace)
- DMARC policy configuration and testing
- Verification procedures and troubleshooting
- Post-implementation monitoring guide

Current status documented:
- SPF: PASS (configured correctly)
- DKIM: MISSING (not configured)
- DMARC: MISSING (not configured)
- MX: PASS (points to M365)

Impact: Missing DKIM/DMARC affects deliverability and domain security
Priority: HIGH
Estimated time: 30-45 min + 24-48h DNS propagation

Updated:
- clients/kittle/docs/email/dkim-dmarc-setup.md (NEW - full guide)
- clients/kittle/docs/network/dns.md (external DNS section, TODO items)

Machine: Mikes-MacBook-Air.local
Timestamp: 2026-04-24 09:28:23

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
2026-04-24 09:28:34 -07:00
deecac745d session log: kittle — M365 breach check and remediation 2026-04-23
Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-04-24 07:13:16 -07:00
6e2d99bd23 sync: auto-sync from HOWARD-HOME at 2026-04-23 21:12:42
Author: Howard Enos
Machine: HOWARD-HOME
Timestamp: 2026-04-23 21:12:42
2026-04-23 21:12:43 -07:00
6ec260c023 cascades: LE folder redirection end-to-end + share access review doc
Major work from 2026-04-23:

Folder redirection (OU=Life Enrichment):
- Added 5 folders (Desktop, Pictures, Music, Videos, Favorites) to CSC - Folder
  Redirection (LE) alongside existing Documents + Downloads. All use Flags=1021
  (Basic + create folder per user + move contents + policy-removal: redirect back).
- Created CSC - Always Wait For Network GPO, linked at OU=Workstations. Disables
  FLO via correct Winlogon registry path (HKLM\Software\Policies\Microsoft\
  Windows NT\CurrentVersion\Winlogon\SyncForegroundPolicy=1). First attempt used
  wrong path (Windows\System) which Winlogon ignored.
- Proved GPO FR works for clean-hive users (test user LE.FRTest, now removed).
- Wrote susan-profile-fix.ps1 to repair ProfWiz-poisoned profiles: robocopies
  local content to \CS-SERVER\homes\<user>, loads NTUSER.DAT, rewrites User
  Shell Folders (legacy + modern GUIDs) to UNC, unloads. Applied to Susan Hicks,
  verified via live SMB session + content access.

Share access review doc:
- share-access-matrix-2026-04-23.md drafted for John/Meredith review. One
  short block per employee (department + position + folders they can access).
  All settled decisions from today's calls captured (Sandra Fish = Meredith-
  only, Culinary = kitchen + M/J/A, no chat share, caregivers zero on-prem,
  Veronica = Meredith tier, CasAdmin201 retired, pacs empty).

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-23 20:07:59 -07:00
b6d00207ff session log: Neptune outage recovery + Exchange 2019 migration plan
Post-reboot recovery phase: WS2022 upgrade (done 2026-04-22) identified
as root cause — Exchange 2016 unsupported on WS2022. Mail flow restored
at 14:32 via explicit DNS-server override on TransportServer (edgetransport
on WS2022 ignores OS suffix search). Rollback unavailable (all paths dead).

Migration planning phase: Exchange 2019 on fresh WS2022 VM picked over
2016-rebuild. Config snapshot captured to C:\NeptuneConfigExport-20260423\
(34 files, 22 config areas, 56-mailbox CSV inventory, SBR configs).
Full 6-phase migration runbook written covering prereqs, schema prep,
install+config port, mailbox moves, cutover, and carcass force-removal.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-23 15:17:35 -07:00
Administrator
742c25c96e session log: Neptune inbound mail outage + partial recovery (pre-reboot snapshot)
KB5082142 (Windows Server 21H2 CU) + KB5084071 (.NET Framework CU) triggered
cascading Exchange 2016 failures on NEPTUNE today. External SMTP ingest was
restored after 4 fixes (registry ACL on AssistantsQuarantine, Routing Master
DN, disabled messageconcept ExSBR, hosts entries for dead MAIL server). But
internal pipeline (Submission -> categorizer -> mailbox delivery) remained
broken until 3 more fixes (DNS records on ACG-DC16 for n-hosting1/n-largeboxes
/mail, disabled hung DkimSigner agent, disabled IRM to silence RMS Encryption
Agent timeouts). Submission queue still pinned at ~427 messages pre-reboot;
full Neptune reboot queued to clear edgetransport.exe in-memory DNS cache and
pending KB5082142 reboot actions.

All registry/AD/config backups in C:\BackupBeforeFix\ on Neptune. Post-reboot
verification checklist documented in the log.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-23 15:17:34 -07:00
Administrator
887a672e7d scc: Neptune Exchange cleanup - domain/mailbox removal, SBR routing, Mailprotector config, spam purge
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-23 12:35:04 -07:00
e5dc77cb96 sync: auto-sync from HOWARD-HOME at 2026-04-23 11:09:16
Author: Howard Enos
Machine: HOWARD-HOME
Timestamp: 2026-04-23 11:09:16
2026-04-23 11:09:18 -07:00
5ec20ac9dd session log: Dataforth SMTP fix, GuruRMM GAGETRAK onboarding, Cloudflare grey-cloud, ticket #32142 billed
- Resolved calibration@dataforth.com SMTP AUTH per-mailbox block in Exchange Online
- Full Dataforth tenant onboarding (all 5 ComputerGuru apps consented)
- GuruRMM agent deployed on DF-GAGETRAK; diagnosed and fixed two issues:
  - rmm-api.azcomputerguru.com grey-clouded (Cloudflare was blocking WSS)
  - enrolled_agents auth gap workaround (site API key in AgentKey registry)
- Syncro ticket #32142 billed: 2 hrs prepaid, invoice #67447, status Invoiced
- syncro.md: fix .comment.id jq path (was .id, caused duplicate comments twice)
- tenants.md: Dataforth marked fully onboarded

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-04-23 09:20:00 -07:00
8613d57f6f cascades: master plan + open questions doc (2026-04-23)
Single-doc consolidation of every Cascades doc in the repo: where we are
(what's done, in-flight, ahead), all 48 open questions grouped by recipient
(Meredith, John, Ashley, internal) with T1/T2/T3 urgency, suggested 4-session
sequencing to unblock most work fastest, license/cost summary, and the
5 items Howard can execute right now without answers.

Replaces the piecemeal view across user-account-rollout-plan,
p2-staff-candidates, staff-working-list, hipaa-review, and risk-register docs.
Those remain the detail source; this is the navigation layer.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-23 06:44:28 -07:00
7e2e3a5882 sync: auto-sync from HOWARD-HOME at 2026-04-23 06:21:23
Author: Howard Enos
Machine: HOWARD-HOME
Timestamp: 2026-04-23 06:21:23
2026-04-23 06:21:24 -07:00