ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login
    1. Topics
    2. Categories
    3. IT Discussion
    Log in to post
    Load new posts
    • Recently Replied
    • Recently Created
    • Most Posts
    • Most Votes
    • Most Views
    • WLS-ITGuyW

      O365 & Spam filter

      Watching Ignoring Scheduled Pinned Locked Moved o365 spam
      10
      0 Votes
      10 Posts
      1k Views
      dbeatoD

      @WLS-ITGuy said in O365 & Spam filter:

      I thought I read it somewhere. Thanks.

      What about backups? I thought I read somewhere that O365 doesn't do backups. So if an end user deletes an email or accidentally deletes/moves a folder there is no way to retrieve that.

      Although the backups are for Microsoft themselves see this
      https://docs.microsoft.com/en-us/office365/servicedescriptions/exchange-online-service-description/high-availability-and-business-continuity

      https://docs.microsoft.com/en-us/exchange/back-up-email

      Same as what @JaredBusch said on a user level or even an admin.

    • popesterP

      Favorite (preferably free) terminal.

      Watching Ignoring Scheduled Pinned Locked Moved apple macos terminal cli command line
      20
      2 Votes
      20 Posts
      2k Views
      RamblingBipedR

      @scottalanmiller Yep, I just wanted to share the configuration I use as my daily driver because it makes working in the terminal that much more efficient. The OP mentioned wanting something that was a bit slicker and more powerful, and I think in addition to your choice of terminal, your choice of shell and other tools contributes to having a better experience. I prefer FISH for my shell, and tmux is my terminal multiplexor of choice. ZSH is another great alternative shell as well.

    • syko24S

      MS SAM Audit

      Watching Ignoring Scheduled Pinned Locked Moved audit microsoft microsoft licensing microsoft audit sam audit licensing
      40
      1 Votes
      40 Posts
      5k Views
      D

      @scottalanmiller
      This may also help:
      https://blogs.partner.microsoft.com/mpn/myth-busting-software-asset-management-and-compliance-audits/?ln=en-us
      https://www.microsoft.com/en-us/licensing/learn-more/compliance-verification-faq

      Things like:

      Microsoft SAM programs are voluntary services... A compliance audit is a mandatory review of a company’s use of Microsoft’s products and services...
      These compliance verifications are initiated across less than 5% of Microsoft’s licensing customers worldwide

      But ignoring things like:

      We believe that SAM can be a strategic advantage for all our customers
    • scottalanmillerS

      Fedora 30 LAMP Web Server Varnish Cache Broken After Update

      Watching Ignoring Scheduled Pinned Locked Moved fedora linux fedora 30 varnish cache nginx apache httpd lamp web server
      10
      1 Votes
      10 Posts
      2k Views
      scottalanmillerS

      Worth noting that the issue comes back when you upgrade to Fedora 31 as well. Same fix still applies.

    • DustinB3403D

      Windows Server Event ID Lookup

      Watching Ignoring Scheduled Pinned Locked Moved Solved windows graylog auditing
      10
      0 Votes
      10 Posts
      1k Views
      IRJI

      It will makes sense of all the alerts and centralize everything

    • jmooreJ

      Looking For Alternate IT roles

      Watching Ignoring Scheduled Pinned Locked Moved
      93
      2 Votes
      93 Posts
      8k Views
      jmooreJ

      @scottalanmiller said in Looking For Alternate IT roles:

      @jmoore said in Looking For Alternate IT roles:

      So i saw one vote for specializing in Cloud. Are there any other must learn technologies that would be good for someone with my experience?

      The biggest factor will be... what do you enjoy?

      I knew someone was going to ask this. Its the reason I havent specialized yet. I have about 30 books I have bought, waiting to read and study, because they were all interesting. They are on the topics of: Powershell, Linux, Advanced C++, 3 different Python books, 2 books on Git, Ansible, Voip(Asterisk cert book), Storage(have my SCSP cert book) and will probably venture to VMWare after that, SQL has been great fun when I use it, MCSA books from microsoft because I know I should and Virtualization. I read constanty from blogs to books on all these topics. I love playing with various tools in several of these categories. I know I'm all over the place lol but thats what I like and could see myself specializing in any of those if I needed too.

    • S

      How do you manage internal web proxy with roaming laptop users?

      Watching Ignoring Scheduled Pinned Locked Moved web proxy
      4
      1 Votes
      4 Posts
      342 Views
      M

      @shutdown_engineer said in How do you manage internal web proxy with roaming laptop users?:

      We put a registry key on users laptops to toggle turning the proxy on and off when they are at home.

      What do other people use so that if a user is at home and not connected to our VPN and just wants to surf and check email? Outlook seems to take IE settings so if the proxy is enabled and the user is connected to Wifi only then Outlook will not update and IE won't connect.

      Firefox with no proxy set in the browser is a rough and ready workaround that we also use but far from ideal.

      Users are mostly Win 10. Our DC is Win 2012 R2 and run Sophos Web Appliance Proxy as a VM.

      Thanks

      Why is Firefox rough workaround? Why are your users still using IE? It's almost 2020, not 2000 anymore.
      2nd issue is proxy. Why would you use one? Most web traffic is encrypted, so web proxies became obsolete, as you cannot use one without doing some man in the middle workarounds. If you need web filtering, then use proper solution like Pi-hole or AdGuard Home.

    • pmonchoP

      RDS 2019 Setup and RDS License Role

      Watching Ignoring Scheduled Pinned Locked Moved rds upd user profile disks rdcb rdwa rdweb
      38
      2 Votes
      38 Posts
      5k Views
      DashrenderD

      @wrx7m said in RDS 2019 Setup and RDS License Role:

      When using UPD, is there anyway to access various users profiles' folders and files from the RDS server file system?
      Example:
      C:\Users\Bob\Desktop

      Edit: I found that I can path to it via UNC (\ \server\c$\users\Bob\Desktop), but get permissions error when I go locally, from C:\Users\Bob\Desktop. Also, the Bob folder is only a shortcut (LNK file) in the users directory.

      That is what I HATE about roaming folders... they simply do not act the same as local folders!

      I typically download things to the desktop and execute from there. But when on a system that has a desktop redirected to the server - that fails 99% of the time, I have to move the executable to something actually local, then execute it.

    • scottalanmillerS

      Converting VMware VMs to KVM

      Watching Ignoring Scheduled Pinned Locked Moved p2v v2v virtualization vmware esxi kvm fedora fedora 31
      15
      0 Votes
      15 Posts
      2k Views
      scottalanmillerS

      @black3dynamite said in Converting VMware VMs to KVM:

      I haven't been keeping up with Windows Admin Center for awhile. Was that an option to manage Hyper-V?

      It will be, but I'm not sure that it is yet. We've tried and not been able to get it working even internally anywhere, let alone externally. Once they figure out stability and authentication, I assume that it will be great for that. Being that this is 2016, it's going to suck hard. And if there is a Hyper-V issue, WAC would be down which is a problem in a small environment like this.

    • DustinB3403D

      How to Setup Graylog

      Watching Ignoring Scheduled Pinned Locked Moved graylog centos how to
      2
      3 Votes
      2 Posts
      637 Views
      black3dynamiteB

      The last time I set up Graylog I had to configured SELinux.

      Allow the web server to access the network:
      sudo setsebool -P httpd_can_network_connect 1

      Graylog REST API and web interface:
      sudo semanage port -a -t http_port_t -p tcp 9000

      Elasticsearch (only if the HTTP API is being used):
      sudo semanage port -a -t http_port_t -p tcp 9200

      Allow using MongoDB default port (27017/tcp):
      sudo semanage port -a -t mongod_port_t -p tcp 27017

    • L

      Unable to detect the usb device inside Kali linux in Vmbox

      Watching Ignoring Scheduled Pinned Locked Moved
      4
      0 Votes
      4 Posts
      473 Views
      L

      @DustinB3403 yes it's Oracle virtual box.kali linux is guest is.i have installed the drivers as well

    • DustinB3403D

      NXLog and Windows for Graylog

      Watching Ignoring Scheduled Pinned Locked Moved nxlog graylog configuration
      8
      0 Votes
      8 Posts
      2k Views
      IRJI

      @DustinB3403 said in NXLog and Windows for Graylog:

      @flaxking said in NXLog and Windows for Graylog:

      When I was playing with graylog, I was using Beats

      Care to elaborate?

      Flexible and made to work with different solutions

      https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-overview.html

      https://logz.io/blog/filebeat-tutorial/

    • DanpD

      PetaSAN?

      Watching Ignoring Scheduled Pinned Locked Moved
      4
      0 Votes
      4 Posts
      427 Views
      scottalanmillerS

      PetaSAN, at least in component form, would make an excellent backup target array, for example.

    • DashrenderD

      Explorer search bar broken

      Watching Ignoring Scheduled Pinned Locked Moved
      8
      0 Votes
      8 Posts
      278 Views
      DashrenderD

      because it's not uncommon to do 2+ searches in a row. Now they have to close the window between searches... which means it's broken.

    • wrx7mW

      PowerShell - Add-ADGroupMember Script - Improvements?

      Watching Ignoring Scheduled Pinned Locked Moved
      11
      0 Votes
      11 Posts
      1k Views
      NDCN

      The script I started with was shamelessly stolen from a Technet post.

      That gave me a pretty good start. I did some light editing to more accurately match what was going on at my employer when I first used it for a large batch of users rather a while ago.

      Now I'm making some more changes and additions to turn it into something a bit more broadly useful day to day.

    • WLS-ITGuyW

      FreePBX 15 released

      Watching Ignoring Scheduled Pinned Locked Moved freepbx 15
      15
      0 Votes
      15 Posts
      1k Views
      black3dynamiteB

      @JaredBusch said in FreePBX 15 released:

      Sangoma Vega 100 (I think) PRI gateway. PRI from phone company on one side and sip trunk on the other, hook it up to whatever PBX you want to.

      https://www.voipsupply.com/sangoma-vega-100g

    • 1

      How to check the integrity of a set of files with md5deep

      Watching Ignoring Scheduled Pinned Locked Moved md5 md5sum hashing corruption
      1
      5 Votes
      1 Posts
      3k Views
      No one has replied
    • DashrenderD

      VOIP.ms as a PBX

      Watching Ignoring Scheduled Pinned Locked Moved voip.ms transfer
      1
      1 Votes
      1 Posts
      263 Views
      No one has replied
    • DustinB3403D

      Tar gzip file compression calculation without decompressing the file

      Watching Ignoring Scheduled Pinned Locked Moved Unsolved tar gzip unix apple osx
      20
      0 Votes
      20 Posts
      3k Views
      1

      @DustinB3403 said in Tar gzip file compression calculation without decompressing the file:

      @Pete-S So the simplest way I can think to explain this would be like this.

      You have a network share which is relatively organized

      You create a compressed tarball of any folder on that share and then move that tarball to offsite storage.

      How would I realistically get a hash of that folder pre and post tar and compression and have it make sense? They aren't the same thing, even if they contain the same things.

      @Pete-S said in Tar gzip file compression calculation without decompressing the file:

      Is it safe to assume that the gzip file is correct when it is created?

      This is what I'm looking to verify 🙂

      I'm assuming that files are static during backup.

      If you first of all run md5deep on all files in the folder, you'll create a textfile that contains md5 (or sha256 or what you want) signatures on every file in the folder. Place it into the folder so it ends up inside the backup and you'll always have the ability to verify any uncompressed individual file.

      If you really want to verify your tar.gz file after it's created I think you have to decompress the files to a temporary folder, run md5deep on the files to compare them with the original file. What you really are testing is that the backup-compress-decompress-restore operation is lossless on every file. It should be by design, but if there is an unlikely bug somewhere it's technically possible that it might not be.

      If you use the gzip compression with tar, gzip has a CRC-32 checksum inside that can be used to verify the integrity of the gzip file.

      Or to be even more certain you can create an md5 signature of the entire gzip archive with md5sum or md5deep. Then you can always verify that the archive has not been corrupted.

      If you ever need to restore the files you can verify the integrity of the restored files with the md5 you created on the original files, before you did the backup.

    • J

      Incorporating Ransomware Protection into Backup Plan

      Watching Ignoring Scheduled Pinned Locked Moved
      17
      0 Votes
      17 Posts
      2k Views
      J

      @scottalanmiller said in Incorporating Ransomware Protection into Backup Plan:

      D2D2T

      Appreciate all of the input. This is the solution I've been leaning towards over the last week. Had an infrastructure hiccup & haven't been able to spend any time on this. But I will utilize my existing backup device for the backup disk & incorporate standard LTO-8 drive library with a rotating weekly offsite storage.

    • 1
    • 2
    • 105
    • 106
    • 107
    • 108
    • 109
    • 698
    • 699
    • 107 / 699