Select Page

Classic Blog

Day 3 at VeeamON 2025: From AI to Mai Tais

Morning Tech Keynote and Day 2 Keynote highlights – AI-Powered Data Protection Unveiled Day Three kicked off with a bang at the Technology Keynote, where Veeam’s executives rolled out visionary announcements that blend cutting-edge AI with data resilience. The energy...

VeeamON 2025: Get Ready for San Diego’s Must-See Sessions

A Personal Welcome to the VeeamON Community Hey, Veeam community! Can you feel the excitement? We’re just days away from VeeamON 2025 in sunny San Diego (April 21–23), and I couldn’t be more thrilled. As a proud Veeam Vanguard and longtime VeeamON attendee, I know...

🔐 Weekly Security & KB Reports Are Here! 🎉

🚨 It’s that time again, IT pros and patching warriors — our PortalFuse Weekly Security Update and KB Report for April 22, 2025, are now live and loaded with insights! Whether you're tracking CVEs 🐞, critical KBs 📦, or just want to stay ahead of the latest security...

3-2-1 Backup Rule Revisited

My last few posts were centred around Backup. It makes sense to revisit the 3-2-1 backup Rule, a golden Backup Rule. The 3-2-1 Backup Rule is a time-tested and widely adopted best practice for ensuring data protection and disaster recovery resilience. Living in a...

History of Microsoft Pluton Architecture

Microsoft Pluton is a “chip-to-cloud" security processor designed to enhance PC security by integrating a secure crypto-processor directly into the CPU rather than an external TPM chip. This technology has evolved from Microsoft's earlier security innovations, such as...

How to Upgrade Veeam Backup for Microsoft 365 to v8.1

Veeam released a version of Veeam Backup for Microsoft 365 v8.1 on January 23, 2025, and it has some enhancements, including support for Ubuntu 24.04 and RedHat 9.4 as backup proxy operating systems, multiple stability, performance, and scalability improvements delivered to ensure product reliability. It also resolved some issues.

Troubleshooting Azure Web Apps Using Kudu+

Hey Checkyourlogs Fans, Azure Web Apps is a robust platform-as-a-service (PaaS) offering that enables developers to seamlessly deploy, manage, and scale web applications. However, troubleshooting issues in production environments can be daunting, especially when...

Critical Error – Your Start Menu isn’t working,

Hey Checkyourlogs Fans, Today, while patching some server infrastructure, I encountered an interesting issue. When I clicked on the Start menu, I received a Critical Error message: “Your Start menu isn’t working. We’ll try to fix it the next time you sign in.” Sign...

TechMentor Live! 360 Speaker Experience

Last week, I had the exciting and rewarding opportunity to participate in TechMentor Live! 360 Orlando as a speaker. The sessions were "Security Is Not Meant to Be a Matter of Convenience" and "Advanced Configuration of Microsoft Defender for Endpoint." As it was my...

Navigating Installation Delays During Veeam 12.2 Upgrade

Recently, while upgrading Veeam to version 12.2, I encountered an issue that added approximately 45 minutes to the expected installation time. The delay wasn't due to anything malfunctioning with Veeam itself; it was related to Windows Defender SmartScreen, the...

How to Upgrade Veeam Backup for Microsoft 365 to v8

Veeam released a version of Veeam Backup for Microsoft 365 v8 on September 11, 2024, and includes Immutable backups with the ability to store on any object storage, Enterprise scale and efficiency delivered by Veeam Proxy Pools, Backup for private and shared Teams channels, and Linux-based backup proxies…

Introducing Zero Trust DNS

Introduction Strangely, identity and name resolution have become interesting to me as they essentially underpin the infrastructure of the modern Internet. In some ways, the industry has given up on the security of DNS, with its ability to be susceptible to...

Embracing the Next Chapter: Leveraging My Three Decades of IT Experience to Drive Organizational Transformation and Nurture Future IT Leaders

Embracing a New Chapter: Leveraging Three Decades of IT Experience to Drive Organizational Transformation and Nurture Future IT Leaders After an incredible journey spanning three decades in the IT industry, filled with countless challenges, triumphs, and invaluable...

Ensure that mailbox intelligence is enabled

Welcome to our guide on implementing a crucial recommendation from Microsoft Defender Secure Score: Ensuring that mailbox intelligence is enabled. In today's digitally interconnected world, email remains a primary conduit for communication, but it's also a prime...

Real Time Logging using PowerShell (TAIL)

Hey Checkyourlogs Fans, Having the right tools is crucial in server troubleshooting. PowerShell is a go-to for many administrators, offering commands like Get-Content -Tail -Wait, which can be incredibly helpful, especially when monitoring real-time log files....

Bulk Delete SPAM Subscribers from WordPress

Hey Checkyourlogs Fans, Dave Kawula here, dropping in with a quick yet invaluable tip for all of you managing your WordPress sites. Picture this: you're diligently running your blog, pouring your heart and soul into crafting engaging content, only to find your efforts...

Getting Started with Co-Pilot for Security

Hey Checkyourlogs Fans, Today, we are going to have at Microsoft’s newest flagship offering now in GA called Security for Co-Pilot. I felt that what a better way to celebrate the integration of AI and the Defender Suite than taking it for a test drive. Step 1 – will...

How to Configure Custom Safe Links Policies in Microsoft Defender for Office 365

Safe Links is a feature in Microsoft Defender for Office 365 (formerly known as Office 365 Advanced Threat Protection or ATP) that helps protect your organization from malicious hyperlinks in email messages. When an email contains a hyperlink, Safe Links checks the URL against a list of known malicious links. If the link is safe, the user can access the website normally. However, if the link is malicious, Safe Links blocks access to the website and alerts the user and administrators.

Microsoft Defender for Office 365-Find the Domain Name of the Trusted ARC Sealers from the Message Header

An email message internet header is a metadata set containing information about the sender, recipient, routing, and delivery of an email. It can help you find the domain name of the trusted ARC sealers. The domain name must match the domain specified in the d value of the ARC-Seal and ARC-Message-Signature headers in affected messages.

Microsoft Defender for Office 365-Configure trusted ARC sealers email authentication for Microsoft 365 Custom domains

Authenticated Received Chain (ARC) is a mechanism used in email authentication protocols to address the issues of message forwarding and intermediary handling of emails. It is designed to improve the reliability and security of email authentication systems like SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail).

Microsoft Defender for Office 365 – Configure DMARC email authentication for Microsoft 365 Custom Domains

Domain-based Message Authentication, Reporting, and Conformance (DMARC) builds upon SPF and DKIM to give domain owners greater control over how recipient servers handle their email messages. With DMARC, domain owners can specify policies instructing recipient servers on how to handle emails that fail SPF or DKIM checks. DMARC also enables domain owners to receive reports on email authentication results, allowing them to monitor and improve their email security posture.

Microsoft Defender for Office 365 – Configure DKIM email authentication for Microsoft 365 Custom domains

DomainKeys Identified Mail (DKIM) allows email senders to sign their outgoing emails digitally using cryptographic signatures. These signatures are stored as DKIM records in the domain’s DNS settings. Recipients’ mail servers can then use these signatures to verify that the email content has not been tampered with and originated from an authorized sender.

Microsoft Defender for Office 365-Configure SPF email authentication for Microsoft 365 domains

Microsoft Defender for Office 365 is a cloud-based email filtering service that helps protect businesses against advanced threats such as phishing and malware in emails, links, and collaboration tools like Microsoft Teams, SharePoint, and OneDrive. Formerly known as Office 365 Advanced Threat Protection (ATP), Microsoft Defender for Office 365 provides several features to enhance the security posture of an organization’s email and collaboration environment.

Optimizing Resource Allocation in Hyper-V Clusters

Resource allocation is at the core of efficient Hyper-V cluster management, dictating virtualized workloads' performance, scalability, and resilience. However, imbalances in resource allocation, encompassing CPU, memory, and storage, can precipitate performance...

Storage Failures in Hyper-V Cluster Management

Within the intricate web of Hyper-V cluster management, storage serves as the lifeblood, facilitating the seamless operation of virtualized workloads. However, the spectre of storage failures looms large, encompassing various issues ranging from disk failures to...