Search This Blog

Wednesday, October 31, 2018

OpenVPN support for Azure VPN Gateways --- point-to-site P2S

https://azure.microsoft.com/en-us/updates/openvpn-support-for-azure-vpn-gateways/

Azure Virtual Network Gateways now support OpenVPN as a protocol for point-to-site (P2S) clients to connect. A P2S VPN gateway connection lets you create a secure connection to your virtual network from an individual client computer. A P2S connection is established by starting it from the client computer. This solution is useful for telecommuters who want to connect to Azure Virtual Networks from a remote location, such as from home or

.............
Scales sets are often integrated with Azure insight, Load balancer and Nat rules

Tuesday, October 30, 2018

will Office 2019 run on windows 7 ? no, but office 365 will still run

will Office 2019 run on windows 7 ? not, but office 365 will still run

https://www.intowindows.com/you-cannot-install-office-2019-on-windows-7-windows-8-8-1/

Quote:

Office 2019 supports Windows 10 only

Interestingly, according to Microsoft, Office 2019 will be exclusive to Windows 10. This means that PC users running Windows 7, Windows 8 and Windows 8.1 will not be able to install or use Office 2019 on their PCs. That is, Office 2019 will not support Windows 7, Windows 8 and Windows 8.1.

Office 2019 minimum system requirements

# 1.6 GHz or faster, 2-core processor
2.0 GHz or faster recommended for Skype for Business
# 4 GB RAM for 64-bit; 2 GB RAM for 32-bit
# 4.0 GB free disk space
# 1280 x 768 or higher screen resolution
# Windows 10, Windows Server 2019

The CIA Triad is a conceptual model for thinking about the security of information.

The CIA Triad is a conceptual model for thinking about the security of information. The triad is composed of the concepts of Confidentiality, Integrity, and Availability. There are multiple conceptual models for thinking about information security. Other conceptual models, such as the OECD’s Guidelines for the Security of Information Systems and Networks have nine principles, and the NIST’s Engineering Principles for Information Technology Security model has 33 principles. While there is no single generally agreed upon conceptual model for describing all aspects of information security, a benefit of the CIA Triad is its simplicity, which drives easy adoption by both information security workers as well as other stakeholders within the organization.

- source Microsoft edx


Architecture of Microsoft Enterprise Threat Detection

From the architectural standpoint, Microsoft ETD offering consists of the following two main components:

  • Corporate Error Reporting
  • Cyber Threat Intelligence (CTI)

Saturday, October 27, 2018

windows 2019 is coming, yet not there due to the 1809 bug

https://www.gigxp.com/comparison-of-windows-server-2016-vs-2019-whats-the-difference/

  • Windows Advanced Threat Protection or ATP
  • Enhanced Hybrid Cloud Support
improvement as above


Friday, October 26, 2018

migrating 2003 AD to 2019 AD ?

https://www.virtualizationhowto.com/2018/10/migrate-from-windows-server-2003-to-windows-server-2019-with-storage-migration/

look like it is still possible


Thursday, October 25, 2018

weird questions in azure VM sizes

A Standard_A7 virtual machine would be consideredGeneral Purpose. The Standard_A7 virtual machine is part of the General Purpose series.

A1. A1 is the smallest size recommended for production environments.

Resource Manager template. This is a file that defines one or more resources to deploy to a resource group. It also defines the dependencies between the deployed resources. The template can be used to deploy the resources consistently and repeatedly.

Wednesday, October 17, 2018

a new type of malware attack -- Coin mining attacks

As of early 2018, coin mining attacks are becoming increasingly prevalent due to their lucrative nature. Coin mining malware deployed in attacks is sophisticated enough only to use some, not all, of the host systems resources ................

source - Microsoft

Windows Defender Device Guard is a security feature for Windows 10 Enterprise and Windows Server 2016 designed to use application whitelisting and code integrity policies to protect users' devices from malicious code that could compromise the operating system

Another pattern that represents the way more sophisticated attacks are carried out is referred to by using the acronym OODA, representing four stages in a typical attack – Observe, Orient, Decide, and Act.

Azure AD domain services - interesting

https://docs.microsoft.com/en-us/azure/active-directory-domain-services/

Azure AD Domain Services provides managed domain services such as domain join, group policy, LDAP, Kerberos/NTLM authentication that are fully compatible with Windows Server Active Directory.

but not very flexible
  

Sunday, October 14, 2018

new Microsoft learning portal https://academy.microsoft.com/en-us/dashboard

https://academy.microsoft.com/en-us/dashboard


ARP messages are sent using which Ethertype designation in the frame header?“0x0806.”

ARP messages are sent using which Ethertype designation in the frame header?“0x0806.”
- source cisco

Which one of the following options is a valid field in the UDP header?"checksum."

Which one of the following options describes the three steps in the TCP three-way handshake?
1. SYN; 2. SYN, ACK; 3. ACK."

the following fields are found in a TCP segment?
source port," "window size," and "checksum

Monday, October 8, 2018

Google calendar not showing on my iphone 5 s

Google calendar not showing on my iphone 5 s

delete the original gmail app

re-add mail as google

now Gmail calendar showing in Calendar

See your Google Calendar in Outlook

See your Google Calendar in Outlook

https://support.office.com/en-us/article/see-your-google-calendar-in-outlook-c1dab514-0ad4-4811-824a-7d02c5e77126

this article is a bit outdated, but the idea is still the same

Saturday, October 6, 2018

interesting new windows 10 for remote desktops

https://www.petri.com/windows-virtual-desktop-is-multi-user-vdi-in-the-azure-cloud?_hsenc=p2ANqtz--EpWU-k5czk_z2OcinfCabN4a8Ga4WcUTVCfK8plfacDCTm17hhI44lADGa_1bLldDtaHKqnGEXocKu-6TBNzOL4k1IA&_hsmi=66370524

quote:

Windows 10 for Remote Desktops on azure

Windows Virtual Desktop Licensing

For Microsoft 365 E3, E5, F1 and Windows Enterprise and Education E3 and E5 customers, a license to use WVD will be integrated. All those organizations do is sign up for a free Azure account and pay for the compute and storage resources used. WVD is supported across the entire range of Azure VMs, including reserved VM instances and VMs with GPU support.


Thursday, October 4, 2018

Wednesday, October 3, 2018

itunes media locate on a network drive

itunes media locate on a network drive

yes, it actually can


chrome remote desktop vs teamviewer

tried chrome remote desktop

cannot see the remote cursor properly

teamviewer comes to the rescue