Files
claudetools/clients/dataforth/docs/overview.md
Howard Enos 8d975c1b44 import: ingested 160 files from C:\Users\howar\Clients
Howard's personal MSP client documentation folder imported into shared
ClaudeTools repo via /import command. Scope:

Clients (structured MSP docs under clients/<name>/docs/):
- anaise       (NEW)  - 13 files
- cascades-tucson     - 47 files merged (existing had only reports/)
- dataforth           - 18 files merged (alongside incident reports)
- instrumental-music-center - 14 files merged
- khalsa       (NEW)  - 22 files, multi-site (camden, river)
- kittle       (NEW)  - 16 files incl. fix-pdf-preview, gpo-intranet-zone
- lens-auto-brokerage (NEW) - 3 files (name matches SOPS vault)
- _client_template    - 13-file scaffold for new clients

MSP tooling (projects/msp-tools/):
- msp-audit-scripts/ - server_audit.ps1, workstation_audit.ps1, README
- utilities/         - clean_printer_ports, win11_upgrade,
                       screenconnect-toolbox-commands

Credential handling:
- Extracted 1 inline password (Anaise DESKTOP-O8GF4SD / david)
  to SOPS vault: clients/anaise/desktop-o8gf4sd.sops.yaml
- Redacted overview.md with vault reference pattern
- Scanned all 160 files for keys/tokens/connection strings -
  no other credentials found

Skipped:
- Cascades/.claude/settings.local.json (per-machine config)
- Source-root CLAUDE.md (personal, claudetools has its own)
- scripts/server_audit.ps1 and workstation_audit.ps1 at source root
  (identical duplicates of msp-audit-scripts versions)

Memory updates:
- reference_client_docs_structure.md (layout, conventions, active list)
- reference_msp_audit_scripts.md (locations, ScreenConnect 80-char rule)

Session log: session-logs/2026-04-16-howard-client-docs-import.md

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-16 19:43:58 -07:00

3.0 KiB
Raw Blame History

Client Overview

Company Name

Dataforth Corporation

Primary Contact

IT Contact

Address

3331 E. Hemisphere Loop, Tucson, AZ 85706 USA Phone: (520) 741-1404 | Fax: (520) 741-0762 Website: www.dataforth.com

Industry

Signal Conditioning / Data Acquisition — Manufacturing

Environment Summary

  • Domain: intranet.dataforth.com
  • Forest/Domain Level: Windows Server 2016
  • Total Active Users: ~21 human + ~5 service + 50+ machine/functional accounts
  • Servers: 6 (AD1, AD2, FILES-D1, SAGE-SQL, 3CX, DF-HYPERV-B)
  • Hypervisors: 2x ESXi (122, 124) + 1x Hyper-V (DF-HYPERV-B)
  • Engineering Workstations: ~12
  • Manufacturing/Assembly: ~14
  • Office/Admin: ~12
  • DOS Test Stations: 64 (MS-DOS 6.22, not domain-joined)
  • End-of-Life Machines: 3 (Windows 7: LABELPC, LABELPC2, D2-RCVG-003)
  • M365 Tenant ID: 7dfa3ce8-c496-4b51-ab8d-bd3dcd78b584
  • Entra ID Sync: Yes (Azure AD Connect from OU=SyncedUsers)
  • RMM: Datto RMM + GuruRMM (azcomputerguru.com)

Key Applications

  • TestDataDB: Node.js + SQLite web app on AD2:3000 — 2.28M test records, 1,470+ model specs
  • Sage ERP: On SAGE-SQL (192.168.0.153), mapped as S:
  • 3CX Phone: On 3CX server (192.168.0.125) — possibly inactive (last logon Oct 2025)
  • GageTrak: Calibration tracking on DF-GAGETRAK (192.168.0.102)
  • QuickBASIC 4.5 ATE: Automated test equipment on 64 DOS stations

Key Contacts

Dataforth Staff

Name Username Role Email
John Lehman jlehman Engineering, QB code, test specs jlehman@dataforth.com
Peter Iliya pIliya Applications Engineer pIliya@dataforth.com
Dan Center dcenter Operations dcenter@dataforth.com
Georg Haubner ghaubner Engineering, has D: backup ghaubner@dataforth.com
Ken Hoffman khoffman / oemdata TestDataSheetUploader author
Logan Tobey ltobey Support/Sales ltobey@dataforth.com
Ben Wadzinski bwadzinski Engineering
Lee Payne lpayne Engineering
Theresa Dean tdean Admin tdean@dataforth.com
Joel Lohr jlohr RETIRED 2026-03-31 jlohr@dataforth.com

External

Name Role Contact
Mike Swanson IT Consultant (azcomputerguru.com) mike@azcomputerguru.com
Ginger (Quatronix) China distributor gy@quatronix-cn.com
Support Pool Customer support support@dataforth.com / (520) 741-1404

Notes

  • Suffered a crypto/ransomware attack in 2025 — AD2 was wiped and rebuilt, many files lost
  • DF-JOEL2 compromised 2026-03-27 via phishing — remediated, Joel retired 3/31
  • Test datasheet pipeline rebuilt 2026-03-2729 after crypto wipe broke original VB6 tooling
  • MFA enforcement deadline: April 4, 2026 — 19/38 users still need to register
  • Previous MSP/IT: Mike Swanson (azcomputerguru.com) — prepared this audit for handoff