IT-Administrator Magazin
banner
it-administrator.de
IT-Administrator Magazin
@it-administrator.de
Der IT-Administrator ist das monatliche Praxismagazin für den System- und Netzwerkadministrator.
Impressum: http://it-a.eu/impressum
In Ausgabe 1/26 zeigen wir, wie Sie Infrastruktur stabil betreiben – von Flüssigkühlung bis zu sicheren Datacenter Interconnects.

Ausgabe jetzt vor bestellen oder Anfang 2026 am Kiosk!

www.it-administrator.de/vorschau-jan...
Vorschau Januar 2026: Infrastruktur & Rechenzentrum
IT-Administrator Januar 2026 mit Schwerpunkt Infrastruktur und Rechenzentrum: Trends, Entwicklungen und Innovationen im IT-Bereich.
www.it-administrator.de
December 15, 2025 at 1:02 PM
Kubernetes-Secrets sind oft alles andere als geheim. Im Interview erklärt Michael Hofer – CTO bei Adfinis –, warum unverschlüsselte Speicherung, breite RBAC-Rechte und Secrets-Sprawl echte Risiken sind – und wie freie Plattformen wie OpenBao dagegenhalten.

www.it-administrator.de/interview-ku...
»Administratoren sollten sich vom Namen Secret nicht täuschen lassen«
Kubernetes-Secrets sind oft ungeschützt. CTO Michael Hofer erklärt im Interview Risiken, Best Practices und wie moderne Secrets-Management-Plattformen Administratorsicherheit erhöhen.
www.it-administrator.de
December 8, 2025 at 2:21 PM
Cloudflare meldet erneut technische Probleme: Diesmal stehen vor allem Workers-Skripte und die zugehörige KV-Datenbank im Fokus.

www.it-administrator.de/cloudflare-n...
Cloudflare: Neue Störung betrifft Workers und KV-Dienste
Cloudflare untersucht erneut eine Störung: Kunden melden leere API-Antworten in Workers KV und erhöhte Fehlerraten bei Workers-Skripten. Ursache und Umfang sind noch unklar, das Unternehmen arbeitet a...
www.it-administrator.de
December 5, 2025 at 10:56 AM
Public Service Announcement:
How To Tell If Spyware Is Hiding On Your Phone And What To Do About It #Android #CyberPhishing #FinancialData
How To Tell If Spyware Is Hiding On Your Phone And What To Do About It
  Your smartphone stores personal conversations, financial data, photos, and daily movements. This concentration of information makes it attractive to attackers who rely on spyware. Spyware is malicious software that pretends to be a useful app while silently collecting information. It can arrive through phishing messages, deceptive downloads, fake mobile tools, or through legitimate apps that receive harmful updates. Even monitoring tools designed for parents or employers can be misused to track someone without their knowledge. Spyware exists in multiple forms. One common category is nuisanceware, which appears with legitimate apps and focuses on showing unwanted ads, altering browser settings, and gathering browsing data for advertisers. Although it does not usually damage the device, it still disrupts user activity and profits from forced ad interactions. Broader mobile spyware goes further by pulling system information, clipboard content, login credentials, and data linked to financial accounts. These threats rely on tricking users through harmful emails, unsafe attachments, social media links, fake text messages, or direct physical access. A more aggressive class of spyware overlaps with stalkerware and can monitor nearly every action on a victim’s device. These tools read messages across different platforms, intercept calls, capture audio from the environment, trigger the camera, take screenshots, log keystrokes, track travel routes, and target social media platforms. They are widely associated with domestic abuse because they allow continuous surveillance of a person’s communication and location. At the highest end is commercial spyware sold to governments. Tools like Pegasus have been used against journalists, activists, and political opponents, although everyday users are rarely targeted due to the high cost of these operations. There are several early signs of an attempted spyware install. Strange emails, unexpected social media messages, or SMS alerts urging you to click a link are often the first step. Attackers frequently use urgent language to pressure victims into downloading malicious files, including fake delivery notices or warnings framed as bank or tax office messages. Sometimes these messages appear to come from a trusted contact. Stalkerware may require physical access, which means a phone that briefly goes missing and returns with new settings or apps could have been tampered with. Once spyware is installed, your phone may behave differently. Rapid battery drain, overheating, sudden reboots, location settings turning on without reason, or a sharp increase in mobile data use can indicate that data is being transmitted secretly. Some variants can subscribe victims to paid services or trigger unauthorized financial activity. Even harmless apps can turn malicious through updates, so new problems after installing an app deserve attention. On Android devices, users can review settings that control installations from outside official stores. This option usually appears in Settings > Security > Allow unknown sources, although the exact location depends on the manufacturer. Another path to inspect is Apps > Menu > Special Access > Install unknown apps, which lists anything permitted to install packages. This check is not completely reliable because many spyware apps avoid appearing in the standard app view. Some spyware hides behind generic names and icons to blend in with normal tools such as calculators, calendars, utilities, or currency converters. If an unfamiliar app shows up, running a quick search can help determine whether it belongs to legitimate software. For iPhones that are not jailbroken, infection is generally harder unless attackers exploit a zero-day or an unpatched flaw. Risks increase when users delay firmware updates or do not run routine security scans. While both platforms can show signs of compromise, sophisticated spyware may remain silent. Some advanced surveillance tools operate without leaving noticeable symptoms. These strains can disguise themselves as system services and limit resource use to avoid attention. Removing spyware is challenging because these tools are designed to persist. Most infections can be removed, but some cases may require a full device reset or, in extreme scenarios, replacing the device. Stalkerware operators may also receive alerts when their access is disrupted, and a sudden halt in data flow can signal removal. If removing spyware could put someone at physical risk, they should avoid tampering with the device and involve law enforcement or relevant support groups. Several approaches can help remove mobile spyware: 1. Run a malware scan: Reputable mobile antivirus tools can detect many common spyware families, though they may miss advanced variants. 2. Use dedicated removal tools: Specialized spyware removal software can help, but it must only be downloaded from trusted sources to avoid further infection. 3. Remove suspicious apps: Reviewing installed applications and deleting anything unfamiliar or unused may eliminate threats. 4. Check device administrator settings: Spyware may grant itself administrator rights. If such apps cannot be removed normally, a factory reset might be necessary. 5. Boot into Safe Mode: Safe Mode disables third-party apps temporarily, making removal easier, though advanced spyware may still persist. 6. Update the operating system: Patches often close security gaps that spyware relies on. After discovering suspicious activity, users should take additional security steps: • Change passwords and enable biometrics: Resetting passwords on a separate device and enabling biometric locks strengthens account and device security. • Create a new email address: A private email account can help regain control of linked services without alerting a stalkerware operator. Advanced, commercial spyware demands stronger precautions. Research-based recommendations include: • Reboot the device daily to disrupt attacks that rely on temporary exploits. • Disable iMessage and FaceTime on iOS, as they are frequent targets for exploitation. • Use alternative browsers such as Firefox Focus or Tor Browser to reduce exposure from browser-based exploits. • Use a trusted VPN and jailbreak detection tools to protect against network and system-level intrusion. • Use a separate secure device like those running GrapheneOS for sensitive communication. Reducing the risk of future infections requires consistent precautions: • Maintain physical device security through PINs, patterns, or biometrics. • Install system updates as soon as they are released. • Run antivirus scans regularly. • Avoid apps from unofficial sources. • Enable built-in security scanners for new installations. • Review app permissions routinely and remove intrusive apps. • Be cautious of suspicious links. • Avoid jailbreaking the device. • Enable multi-factor authentication, keeping in mind that spyware may still capture some verification codes.
dlvr.it
December 4, 2025 at 7:51 AM
Der Open-Source-Anbieter Collabora hat eine neue Desktopversion seiner Office-Suite vorgestellt. "Collabora Office for desktop" bringt das bisher browserbasierte Collabora Online erstmals als lokal installierbare Suite für Linux, Windows und macOS.

www.it-administrator.de/collabora-of...
Zwei Wege offline: Collabora erweitert seine Suite
Collabora stellt eine neue Desktopversion mit moderner Web-UI vor. Die Suite ergänzt das bisherige Classic-Produkt um eine zweite Offline-Edition für Linux, Windows und macOS.
www.it-administrator.de
December 2, 2025 at 9:50 AM
Das Backuptool "Kasten K10" von Veeam sichert neben Daten von Kubernetes-Anwendungen auch alle nötigen Konfigurations- und Betriebsdaten. So tritt die Software an, Kubernetes-Sicherungen zu vereinfachen – was in unserem Test mit Bravour gelang.

www.it-administrator.de/Test-Veeam-K...
Im Test: Veeam Kasten K10
Wie schlägt sich Veeam Kasten K10 im Kubernetes-Umfeld? Unser Test zeigt Stärken bei Backup, Migration und konsistenten Snapshots.
www.it-administrator.de
December 1, 2025 at 11:09 AM
Es muss nicht immer ein Datenleck sein...
Why Long-Term AI Conversations Are Quietly Becoming a Major Corporate Security Weakness #AIChatbots #ArtificialIntelligence #Corporatedata
Why Long-Term AI Conversations Are Quietly Becoming a Major Corporate Security Weakness
  Many organisations are starting to recognise a security problem that has been forming silently in the background. Conversations employees hold with public AI chatbots can accumulate into a long-term record of sensitive information, behavioural patterns, and internal decision-making. As reliance on AI tools increases, these stored interactions may become a serious vulnerability that companies have not fully accounted for. The concern resurfaced after a viral trend in late 2024 in which social media users asked AI models to highlight things they “might not know” about themselves. Most treated it as a novelty, but the trend revealed a larger issue. Major AI providers routinely retain prompts, responses, and related metadata unless users disable retention or use enterprise controls. Over extended periods, these stored exchanges can unintentionally reveal how employees think, communicate, and handle confidential tasks. This risk becomes more severe when considering the rise of unapproved AI use at work. Recent business research shows that while the majority of employees rely on consumer AI tools to automate or speed up tasks, only a fraction of companies officially track or authorise such usage. This gap means workers frequently insert sensitive data into external platforms without proper safeguards, enlarging the exposure surface beyond what internal security teams can monitor. Vendor assurances do not fully eliminate the risk. Although companies like OpenAI, Google, and others emphasize encryption and temporary chat options, their systems still operate within legal and regulatory environments. One widely discussed court order in 2025 required the preservation of AI chat logs, including previously deleted exchanges. Even though the order was later withdrawn and the company resumed standard deletion timelines, the case reminded businesses that stored conversations can resurface unexpectedly. Technical weaknesses also contribute to the threat. Security researchers have uncovered misconfigured databases operated by AI firms that contained user conversations, internal keys, and operational details. Other investigations have demonstrated that prompt-based manipulation in certain workplace AI features can cause private channel messages to leak. These findings show that vulnerabilities do not always come from user mistakes; sometimes the supporting AI infrastructure itself becomes an entry point. Criminals have already shown how AI-generated impersonation can be exploited. A notable example involved attackers using synthetic voice technology to imitate an executive, tricking an employee into transferring funds. As AI models absorb years of prompt history, attackers could use stylistic and behavioural patterns to impersonate employees, tailor phishing messages, or replicate internal documents. Despite these risks, many companies still lack comprehensive AI governance. Studies reveal that employees continue to insert confidential data into AI systems, sometimes knowingly, because it speeds up their work. Compliance requirements such as GDPR’s strict data minimisation rules make this behaviour even more dangerous, given the penalties for mishandling personal information. Experts advise organisations to adopt structured controls. This includes building an inventory of approved AI tools, monitoring for unsanctioned usage, conducting risk assessments, and providing regular training so staff understand what should never be shared with external systems. Some analysts also suggest that instead of banning shadow AI outright, companies should guide employees toward secure, enterprise-level AI platforms. If companies fail to act, each casual AI conversation can slowly accumulate into a dataset capable of exposing confidential operations. While AI brings clear productivity benefits, unmanaged use may convert everyday workplace conversations into one of the most overlooked security liabilities of the decade.
dlvr.it
November 28, 2025 at 10:47 AM
Das Klinikum Werra-Meißner, das jährlich rund 60.000 Patienten versorgt, berichtet über seine speziellen Werkzeuge für revisionssichere Archivierung und Backup seiner hochsensiblen Daten.

www.it-administrator.de/revisionssic...
Revisionssichere Speichersysteme im Gesundheitswesen
Das Klinikum Werra-Meißner zeigt, wie Krankenhäuser mit WORM-Archivierung, 3-2-1-Backup und NIS2-konformer IT langfristig Datenschutz gewährleisten.
www.it-administrator.de
November 27, 2025 at 8:07 AM
👍
“ORCA introduces a model that breaks software into isolated, resilient parts to stop threats before they spread.” The Linux Foundation launches the Open Robust Compartmentalization Alliance (ORCA) to boost software resilience. Learn more: orca-lf.org
🐋
November 25, 2025 at 8:06 AM
Im Dezember-Heft werfen wir deshalb einen Blick auf das Container-Management, das um Kubernetes kaum herum kommt – mit all seinen Vor- und Nachteilen. Wie zeigen Alternativen ebenso auf wie Tools, die den Platzhirsch bändigen helfen.

www.it-administrator.de/vorschau-dez...
Vorschau Dezember 2025: Container-Management
Die Dezember-Ausgabe des IT-Administrator steht im Zeichen des Container-Managements mit Azure Container Apps, Google Cloud Run und Nutanix Kubernetes Platform.
www.it-administrator.de
November 24, 2025 at 9:37 AM
🚨 Cloudflare-Störung sorgt für Ausfälle
Zahlreiche Webseiten zeigen aktuell Fehler an: Laut Cloudflare gibt es verbreitete 500-Errors sowie Ausfälle von Dashboard und API. Plattformen wie X oder ChatGPT laden Inhalte teilweise nicht oder sind nicht erreichbar: www.it-administrator.de/Cloudflare-S...
November 18, 2025 at 12:46 PM
Der Kollege Günter Born nimmt hier haarklein auseinander, welche Sicherheitsrisiken der Einsatz von LLMs mitbringt.

(Spoiler: sehr viele...)
November 13, 2025 at 9:00 AM
Mit NSX zu Zero Trust – keine ganz einfache Aufgabe, doch unser Online-Dreiteiler zeigt den Weg dorthin.

www.it-administrator.de/workloads-mi...
Workloads mit VMware NSX absichern (1)
Erfahren Sie, wie VMware NSX mit Mikrosegmentierung und Zero Trust für mehr Sicherheit in vSphere-Umgebungen sorgt – ohne Ausfallzeiten.
www.it-administrator.de
November 11, 2025 at 12:48 PM
Drei neu entdeckte Schwachstellen in "runc" machen Docker & Kubernetes angreifbar.

www.it-administrator.de/container-es...
Container-Escape: Schwachstellen in runc
Drei neu entdeckte Schwachstellen in runc, dem Container-Backend von Docker und Kubernetes, ermöglichen potenziell Container-Escapes. SUSE und Sysdig empfehlen ein sofortiges Update auf runc 1.2.8, 1....
www.it-administrator.de
November 10, 2025 at 1:20 PM
Zwar gehören die Zeiten instabiler DSL-Leitungen der Vergangenheit an – doch hin und wieder ist ein Blick auf den tatsächlichen Datenverkehr vonnöten. OpenNetMeter ist ein Open-Source-Tool, das den Netzwerkdurchsatz von Windows-Systemen aufschlüsselt.

www.it-administrator.de/download-der...
www.it-administrator.de
November 6, 2025 at 8:12 AM
Nach dem Supportende für Microsoft Exchange 2016 und 2019 bleiben in Deutschland zehntausende Systeme verwundbar. Laut BSI laufen rund 90 Prozent der Exchange-Server weiterhin auf diesen alten Versionen und erhalten keine Sicherheitsupdates mehr.

www.it-administrator.de/bsi-warnung-...
BSI warnt: Tausende Exchange-Server ohne Schutz
Nach dem Support-Ende für Microsoft Exchange 2016 und 2019 warnt das BSI vor massiven Sicherheitsrisiken: 92 Prozent der Server in Deutschland laufen weiter ohne Updates. Betroffen sind Unternehmen, B...
www.it-administrator.de
November 4, 2025 at 10:36 AM
Ein Leben ohne VMware ist möglich. Wie, zeigt unser neues Sonderheft "Lokal virtualisieren".

www.it-administrator.de/Sonderheft-V...
Jetzt versandbereit: Sonderheft II/2025 "Lokal virtualisieren"
Ob aus Compliance-Gründen, zur Kostenkontrolle oder aus Prinzip: Wer virtuelle Umgebungen lieber im eigenen Haus betreibt, bekommt mit unserem neuen Sonderheft
www.it-administrator.de
November 3, 2025 at 7:56 AM
IT-Administratoren erhalten mit Windows 11 Version 25H2 neue Möglichkeiten, um vorinstallierte Microsoft-Store-Apps gezielt per Richtlinie zu entfernen.

www.it-administrator.de/windows11-mi...
Windows 11: Vorinstallierte Apps per Policy entfernen
Mit Windows 11 Version 25H2 führt Microsoft eine neue Richtlinie ein, mit der IT-Administratoren vorinstallierte Microsoft-Store-Apps per Gruppenrichtlinie oder Intune entfernen können – ohne Skripte ...
www.it-administrator.de
October 30, 2025 at 8:05 AM
Richtig so!
October 28, 2025 at 8:22 AM
Microsoft hat überraschend ein außerplanmäßiges Sicherheitsupdate für Windows Server veröffentlicht. Grund ist eine kritische Schwachstelle in Windows Server Update Services (WSUS), die Angreifern im schlimmsten Fall eine Remote-Code-Ausführung ermöglicht.

www.it-administrator.de/microsoft-ws...
Sicherheitslücke: Notfall-Patch für WSUS
Microsoft veröffentlicht ein außerplanmäßiges Update für Windows Server, um eine kritische Schwachstelle in den Windows Server Update Services (WSUS) zu schließen.
www.it-administrator.de
October 27, 2025 at 9:11 AM
👇👇👇
October 21, 2025 at 7:41 AM
Wohl kaum ein Admin kann sich etwas Schöneres vorstellen, als Gesetzesblätter zu wälzen...

Wir fassen die Juristerei rund um NIS-2 und DORA kompakt zusammen:

www.it-administrator.de/Anforderunge...
Regulatorische Anforderungen von NIS-2 und DORA
Mit NIS-2 und DORA werden Cybersicherheit und IKT-Risikomanagement zur Pflicht. Der Artikel erklärt zentrale Vorgaben und technische Bausteine.
www.it-administrator.de
October 20, 2025 at 6:56 AM
😵‍💫
October 17, 2025 at 9:05 AM
FSXLogix für Windows-Benutzerprofile einsetzen.

Wir haben unseren Fachartikel auf die neueste Version von FSXLogix aktualisiert:

www.it-administrator.de/node/45591
FSLogix vereinfacht Windows-Benutzerprofile
Erfahren Sie, wie Sie mit Microsoft FSLogix Benutzerprofile effizient verwalten – Schluss mit Profilproblemen in Ihrer IT-Umgebung!
www.it-administrator.de
October 16, 2025 at 9:18 AM
Mit dem Open-Source-Tool "Uptime Kuma" steht Admins ein kostenfreies Werkzeug zur Verfügung, um die Gesundheit von Servern und Netzwerken im Blick zu behalten.

www.it-administrator.de/server-monit...
Servergesundheit rund um die Uhr im Blick
Mit dem Open-Source-Tool Uptime Kuma behalten Admins die Verfügbarkeit ihrer Server im Blick – inklusive Statusseiten, Charts und flexibler Benachrichtigungen über Telegram, Discord & Co.
www.it-administrator.de
October 14, 2025 at 12:52 PM