How to Add Microsoft Entra ID Tenants to Backup Microsoft Entra ID
After you’ve added a Microsoft Entra ID tenant to the backup infrastructure, you can backup and restore Entra ID resources managed by the tenant.
How to Create Log Backup Repositories with Microsoft Azure Blob Storage to Backup Azure Entra ID
A log backup repository is a storage area where Veeam Backup for Microsoft Entra ID keeps backups of audit and sign-in logs from protected Microsoft Entra ID tenants.
Upgrading to Windows 11: A Proactive Roadmap for a Smooth Transition
Introduction Windows 11 introduces a host of new features and improvements designed to enhance productivity, security, and the overall user experience. However, many organizations find themselves delaying the upgrade due to concerns about hardware and software...
From Linux Package Managers to Windows Winget: The Evolution of Software Distribution
Introduction In the world of computing, installing and managing software has come a long way from manual downloads and installations to sophisticated package management systems. Package management began as a solution to handle streamline software installationand...
How to Create Cache Repositories Locally to Backup Microsoft Azure Entra ID
Beginning with version 12.3, the Veeam Backup & Replication solution allows you to add Microsoft Entra ID tenants to the backup infrastructure and manage data protection and recovery operations for these tenants from a single console.
The Evolving Windows Application Deployment Landscape: Embracing the MSIX Era
Introduction In the ever-evolving world of Windows application deployment, IT professionals and software developers are continuously seeking ways to simplify installation, streamline updates, and improve security. We came from very messy beginnings where nearly all...
How to Restore On-Premises VMS to Microsoft Azure
This section describes how to recover (or move) a backup VM to Microsoft Azure.
How to Create a Backup Copy Job offloads backups to Azure Blob Storage
This section describes creating a backup copy job that off-loads to the Azure blob after performing a full backup. It will not use the Azure Blob archive tier.
How to Create a Backup job using Azure Blob repositories as Cloud Redundant Data
This section describes creating a backup job that backs up at local repositories to sync backup files with Azure cloud and off-loads Azure blob after performing a full backup. It would be best to have a scale-out repository ready before beginning this backup job.
How to Create a Backup job using Azure Blob repository as a Backup Repository
This procedure immediately creates a backup job to backup to Azure Blob Repository without local repositories.
How to Add Azure Blob Object Storage Repositories as Performance, Capacity and Archive Tier of Scale-out Repository
This section describes how to add Azure Blob Object Storage Repositories as the performance tier (hot tier), a capacity tier (cool tier) and an archive (cold tier) tier of the scale-out repository.
How to Add Local and Azure Blob Object Storage Repositories as Scale-out Repositories without Archive Tier
A scale-out backup repository allows for horizontal scaling for multi-tier data storage.
How to Upgrade Veeam Backup for Microsoft 365 to v8.1
Veeam released a version of Veeam Backup for Microsoft 365 v8.1 on January 23, 2025, and it has some enhancements, including support for Ubuntu 24.04 and RedHat 9.4 as backup proxy operating systems, multiple stability, performance, and scalability improvements delivered to ensure product reliability. It also resolved some issues.
How to Add Microsoft Azure Archive Blob Storages as Immutability Archive Object Repositories
This section explains adding Microsoft Azure Archive Storage as an immutability archive backup repository to the backup infrastructure. This repository can only be used as an archive extension of the scaled-out backup repository.
Upgrading a Hyper-V Cluster with Storage Spaces Direct on Windows Server 2025 leveraging Veeam VBR Replication
Hey Checkyourlogs Fans, Upgrading a Hyper-V cluster running Storage Spaces Direct (S2D) from Windows Server 2019 to Windows Server 2022 or 2025 can be complex. We follow a best-practice approach that minimizes downtime and ensures a seamless upgrade. This process...
Troubleshooting Server 2022 Storage Spaces Direct (S2D): Fixing Unsupported Miniport Drivers
Hey Checkyourlogs Fans, When migrating a Storage Spaces Direct (S2D) Cluster from Windows Server 2019 to Windows Server 2022 with a fresh OS rebuild, a common issue arises during cluster validation. Specifically, unsupported miniport drivers, such as IaRNVME, can...
How to Add Microsoft Azure Archive Blob Storages as Archive Object Repositories
These steps show how to add Microsoft Azure Archive Storage to the backup infrastructure as a backup repository. This repository can only be used as an archive extension of the scaled-out backup repository.
How to Resolve Read-Only Storage Spaces Pool in Windows Server 2022
Hey Checkyourlogs Fans, When rebuilding or upgrading a Windows Server 2022 operating system, several unexpected challenges related to legacy configurations can arise, especially when dealing with Storage Spaces. One such issue is encountering an old Storage Spaces...
Troubleshooting Event ID 216: The Target Principal Name is Incorrect – Resolving SSPI Context Issues After Moving to Azure SQL Managed Instance
Hey Checkyourlogs Fans, In cloud migrations, connectivity and security issues often arise when transitioning applications from on-premises infrastructure to cloud-based services. One such issue many administrators encounter is Event ID 216 with the error message: The...
How to Add Microsoft Azure Blob Storage as an Immutability Object Repository
Veeam Backup & Replication allows you to prevent data deletion from the object storage repository by making it momentarily immutable and protecting data from malware activity by keeping several versions of a single backup.
How to Add Microsoft Azure Blob Storage as an Object Repository
To add Microsoft Azure Blob Storage as an object repository without immutability, you normally integrate the Azure Blob Storage service to store and manage objects without enforcing retention or immutability requirements.
Directory Tiering in AD in your Lab Environment for Testing
Hey Checkyourlogs Fans, This post outlines the steps needed to create and configure Group Policy Objects (GPOs) for tiering your Active Directory environment. The goal is to restrict access for Domain Admins, Server Admins, and Desktop Admins based on their tiered...
How to Create Veeam Cloud Credential for Microsoft Azure Compute Accounts
To add Microsoft Azure Compute Accounts to Veeam Backup & Replication (or Veeam Backup for Microsoft Azure), you must first integrate your Azure environment with Veeam, which will manage the backup and restoration of Azure Virtual Machines and other computing resources.
Creating Veeam Cloud Credential for Microsoft Azure Storage Accounts with Entra ID Authentication
This Veeam cloud credential is for a Microsoft Azure Blob Object Storage Account with Entra ID authentication connecting to the following sorts of accounts.
Creating Veeam Cloud Credential for Microsoft Azure Storage Accounts with Share Key Authentication
This Veeam cloud credential is for a Microsoft Azure Blob Object Storage Account with Share Key authentication connecting to the following sorts of accounts,
Creating Microsoft Azure Storage Accounts for Immutable Archive Backup Repositories
Veeam Backup & Replication allows you to prevent data deletion from the archive extent by making it temporarily immutable. It is done to improve security: immutability safeguards your data against loss due to attacks, malware activity, or other malicious actions.
Creating Microsoft Azure Storage Accounts for non-Immutable Archive Backup Repositories
Azure Archive Storage is a low-cost, high-durability cloud storage tier inside Azure Blob Storage specifically built for infrequently accessed data and long-term storage. It is the most cost-effective storage tier for data you do not need to access frequently, making it suitable for backup data you wish to keep for an extended term.
Creating Microsoft Azure Storage Accounts for Immutable Backup Repositories
There are some immutability limits in the Azure Blob Storage.
Creating Microsoft Azure Accounts for non-Immutable Backup Repositories
Veeam Backup&Replication supports different types of storage accounts.
How to Upgrade Veeam Backup and Replication Console to v12.3.0.310
Veeam released the Backup & Replication Console v12.3.0.310 on December 03, 2024.
How to Upgrade Veeam Backup and Replication to v12.3.0.310
Veeam released the Backup & Replication v12.3.0.310 on December 03, 2024.
How to Upgrade Veeam Backup Enterprise Manager to v12.3.0.310
Veeam released the Backup & Replication v12.3.0.310 on December 03, 2024.
How to Upgrade Veeam ONE to v12.3
The release version of Veeam ONE 12.3 is available on December 3rd, 2024.
Fix Veeam Backup Enterprise Manager Vulnerability (CVE-2024-40715)
Veeam released the hotfix for the vulnerability in Veeam Backup Enterprise Manager, allowing attackers to bypass the authentication while performing a Man-in-the-Middle (MITM) attack.
Enable Hot Patching in upgraded Server 2022 Azure Edition VM
Hey Checkyourlogs Fans, Hot patching is a powerful feature that allows Windows Server 2022 Datacenter: Azure Edition virtual machines (VMs) to install security updates without requiring a reboot after installation. This blog post focuses on enabling Hot patches for...
How to Build a WordPress Web Site with Azure Database for MYSQL
With an Azure free account, you can use Azure Database for MySQL – Flexible Server for 12 months, and it’s free.
Upgrading from Server 2022 to Server 2022 Azure Edition
Hey Checkyourlogs Fans, Microsoft's Windows Server 2022 Datacenter Azure Edition introduces Azure-exclusive features such as Hot patching, which enables the application of security updates without restarting, and Azure Auto manage for streamlined management. This...
Troubleshooting failing Windows Server In-Place Upgrades with Setupdiag.exe
Hey Checkyourlogs Fans, Upgrading to Windows Server 2022 can occasionally cause issues, leaving IT admins scrambling for answers. One of the most effective tools for diagnosing upgrade failures is Microsoft’s SetupDiag.exe. This lightweight utility is designed to...
Troubleshooting Azure Web Apps Using Kudu+
Hey Checkyourlogs Fans, Azure Web Apps is a robust platform-as-a-service (PaaS) offering that enables developers to seamlessly deploy, manage, and scale web applications. However, troubleshooting issues in production environments can be daunting, especially when...
Troubleshooting Azure VM Connectivity Issues for SportCo – Azure Connectivity Troubleshooter AZURECT
Hey Checkyourlogs, Connectivity issues can sometimes arise when working with Azure Virtual Network Gateway connections from an on-premises environment to an Azure VM. For SportCo, identifying and resolving these issues requires an understanding of the network...
On-Prem Patch Management using Azure Arc and Azure Update Manager
Hey Checkyourlogs Fans, I just wanted to do a quick post on the success of using Azure Update Manager to connect to on-prem Machines for Patch Management. As with many of us, I’m in charge of Patch Tuesday for our customer base. This solution is working amazingly for...
Critical Error – Your Start Menu isn’t working,
Hey Checkyourlogs Fans, Today, while patching some server infrastructure, I encountered an interesting issue. When I clicked on the Start menu, I received a Critical Error message: “Your Start menu isn’t working. We’ll try to fix it the next time you sign in.” Sign...
30 Days of Azure and Office 365 Hands On Labs and Training
Hey Checkyourlogs fans, I am sharing a conceptual outline for 30 full days of classes at a local college that I am pitching to learn the fundamental skills required for Azure and Hybrid Infrastructure. During this course, we will learn how to migrate core elements of...
TechMentor Live! 360 Speaker Experience
Last week, I had the exciting and rewarding opportunity to participate in TechMentor Live! 360 Orlando as a speaker. The sessions were "Security Is Not Meant to Be a Matter of Convenience" and "Advanced Configuration of Microsoft Defender for Endpoint." As it was my...
Resolving RAID Failure on a SuperMicro Windows Backup Target with Veeam Agent for Windows and Recovery Media Creation
Hey Checkyourlogs Fans, In this scenario, we encountered a critical RAID failure on a SuperMicro Windows Backup target, where both drives in the RAID array were lost. Thankfully, we had been using Veeam Agent for Windows, which allowed us to create physical backups...
Navigating Installation Delays During Veeam 12.2 Upgrade
Recently, while upgrading Veeam to version 12.2, I encountered an issue that added approximately 45 minutes to the expected installation time. The delay wasn't due to anything malfunctioning with Veeam itself; it was related to Windows Defender SmartScreen, the...
How to Upgrade Veeam Backup for Microsoft 365 to v8
Veeam released a version of Veeam Backup for Microsoft 365 v8 on September 11, 2024, and includes Immutable backups with the ability to store on any object storage, Enterprise scale and efficiency delivered by Veeam Proxy Pools, Backup for private and shared Teams channels, and Linux-based backup proxies…
Issues Onboarding ARM64 Snapdragon Surface Laptops to Defender Endpoint
Hey Checkyourlogs Fans, Today, I was tasked with onboarding some new Microsoft Surface ARM64-based devices, which had the Snapdragon X 12-core processor. The issue is that we received the following error message when trying to onboard to Defender Endpoint. As you can...
How to Upgrade Veeam ONE to v12.2
The release version of Veeam ONE 12.2 is available on August 28th, 2024.
The vulnerabilities documented in these sections were fixed starting in the 12.2 build.
How to Install Veeam ONE v12.2
The release version of Veeam ONE 12.2 is available on August 28th, 2024. You can download it at:
https://www.veeam.com/products/veeam-data-platform/monitoring-analytics.html
How to Upgrade Veeam Backup and Replication Console to v12.2.0.334
To gain remote access to Veeam Backup & Replication v12.2.0.334, you must first upgrade the Veeam Backup & Replication console to v12.2.0.344 on a dedicated machine.
Upgrade Veeam Backup and Replication Console to v12.1.2.172
To gain remote access to Veeam Backup & Replication v12.1.2.172, you must first upgrade the Veeam Backup & Replication console to v12.12.172 on a dedicated machine.
How to upgrade Veeam Backup Enterprise Manager to v12.2.0.334
Veeam released Backup & Replication v12.2,0,334 on August 28, 2024. Veeam Backup & Replication 12.2 is the newer build of version 12, and the major new features and enhancements were added in Veeam Backup & Replication v12.2. The details are as link...
How to upgrade Veeam Backup and Replication to v12.2.0.334
Veeam released Backup & Replication v12.2.0.334 on August 28, 2024.
How to upgrade Veeam Backup Enterprise Manager to v12.1.2.172
Veeam released the Backup & Replication v12.1.2.172 on May 21, 2024.
The vulnerabilities documented in these sections were fixed starting in the 12.1.2.172 build.
How to upgrade Veeam Backup and Replication to v12.1.2.172
Veeam released the Backup & Replication v12.1.2.172 on May 21, 2024.
The vulnerabilities documented in these sections were fixed starting in the 12.1.2.172 build.
WinRE Too Small – Microsoft KB5034439 Canceled
This post attempts to add value and perhaps some joy to your day by summarizing the WinRE Road trip, which was first introduced with KB5034439 in January of this year. Microsoft canceled KB5034439 on August 13, 2024, and replaced it with KB5042322, as noted under...
Why didn’t high availability clusters prevent the CrowdStrike outage?
I was asked to describe clustering to a person that doesn't know much about this stuff, so here goes (Before anyone asks, the answer is no...I didn't use ChatGPT for this): When you hear "server cluster," you think of a bunch of servers that are joined together...
Enabling Enterprise State Roaming in Entra ID
Introduction Enterprise State Roaming is a feature introduced in Windows 10 (1511) that allows modern applications and Windows settings to follow a user from device to device. It supports a work-anywhere theme by providing a consistent user experience across different...
Making Information Security Policies Accessible and Understandable for Everyone
In today's fast-paced digital world, information security is a critical concern for all organizations. Yet, too often, the policies designed to protect our information are filled with technical jargon that leaves many employees feeling confused and disconnected. It's...
Introducing Zero Trust DNS
Introduction Strangely, identity and name resolution have become interesting to me as they essentially underpin the infrastructure of the modern Internet. In some ways, the industry has given up on the security of DNS, with its ability to be susceptible to...
Embracing the Next Chapter: Leveraging My Three Decades of IT Experience to Drive Organizational Transformation and Nurture Future IT Leaders
Embracing a New Chapter: Leveraging Three Decades of IT Experience to Drive Organizational Transformation and Nurture Future IT Leaders After an incredible journey spanning three decades in the IT industry, filled with countless challenges, triumphs, and invaluable...
Reducing Cyber Insurance Premiums The Most Impactful Cybersecurity Controls
Reducing Cyber Insurance Premiums: The Most Impactful Cybersecurity Controls In today’s digital age, cyber threats are a significant concern for organizations of all types and sizes. The increasing frequency and sophistication of cyberattacks have prompted many...
The Hidden Dangers of Exposing An Organization’s Azure API Key
In the digital era, businesses increasingly rely on cloud services, and the security of application programming interfaces (APIs) is paramount. Understanding the risks associated with API key exposure—particularly concerning Microsoft Azure—is critical for executives...
Microsoft Defender Secure Score Recommended Action (RA) – Ensure that no sender domains are allowed for anti-spam policies
Effective email security is not just about filtering spam; it's about strategically controlling which messages reach your users to prevent threats and minimize disruptions. A common misstep in configuring anti-spam policies is inadvertently allowing sender domains...
Microsoft Defender Secure Score Recommended Action (RA) – Set action to take on bulk spam detection
In the cluttered landscape of organizational email, bulk spam can significantly hinder productivity and expose users to potential security risks. Microsoft Defender offers a robust solution to mitigate these challenges through its advanced spam detection capabilities,...
Intune Certificate Connector: Something Went Wrong
With my adventures implementing Intune, I've found all sorts of interesting errors that can be unhelpful, especially when they involve a user or administrator licensing issue. In my latest error, I was left with a very puzzling error while trying to connect the Intune...
Microsoft Defender Secure Score Recommended Action (RA) – Create zero-hour auto purge policies for phishing messages
Phishing attacks are a pervasive threat in the cybersecurity landscape, often causing significant damage to organizations through data breaches and financial loss. To combat these threats effectively, organizations must adopt proactive measures that can neutralize...
Microsoft Defender Secure Score Recommended Action (RA) – Ensure Safe Attachments policy is enabled
In today's digital age, email remains a primary vector for cybersecurity threats, ranging from phishing attempts to sophisticated malware attacks. As organizations strive to fortify their defenses, it's crucial to leverage every tool available to safeguard sensitive...
Microsoft Defender Secure Score Recommended Action (RA) – Set action to take on spam detection
Secure Score Recommended Action "Actions to Take on Spam Detection" allows organizations to swiftly respond to spam threats, mitigating the risk of data compromise and disruption to business operations. With the implementation of this Recommended Action, enterprises...
Microsoft Defender Secure Score Recommended Action (RA) – Set action to take on high confidence phishing detection
Secure Score Recommended Action "Set action to take on high confidence phishing detection" is a measure that empowers organizations to swiftly respond to imminent phishing threats, mitigating the risk of data compromise and operational disruption. Note: “Recommended...
Microsoft Defender Secure Score Recommended Action (RA) – Create zero-hour auto purge policies for malware
Staying ahead of malicious threats is paramount. With the proliferation of sophisticated malware, organizations face an uphill battle in safeguarding their digital assets. Microsoft Defender Secure Score emerges as a beacon of defense, offering actionable insights to...
Cyber Safe is the New Safety First Initiative for All Organizations
Hey, checkyourlogs.net fans, in the complex and ever-evolving digital landscape, cybersecurity has become a central concern for organizations across all sectors. As cyber threats continue to grow in sophistication and frequency, establishing robust cyber defenses...
How to Configure App Protection Policies (MAM) for Unmanaged Android, iOS, and Windows 11 Devices
For organizations already leveraging Microsoft Intune for corporate device management through Mobile Device Management (MDM), expanding the scope to include personal devices requires a focused approach on Mobile Application Management (MAM). The goal is to protect...
Microsoft Defender Secure Score Recommended Action (RA) – Ensure mobile devices require the use of a password
In the ever-evolving landscape of cybersecurity, safeguarding sensitive data and devices is paramount. As organizations embrace mobility and remote work, the need to fortify defenses against potential threats on mobile devices becomes increasingly critical. Microsoft...
Ensure that mailbox intelligence is enabled
Welcome to our guide on implementing a crucial recommendation from Microsoft Defender Secure Score: Ensuring that mailbox intelligence is enabled. In today's digitally interconnected world, email remains a primary conduit for communication, but it's also a prime...
Microsoft Defender Secure Score Recommended Action (RA) – Turn on Safe Attachments in block mode
As part of Microsoft Defender Secure Score's recommended actions, enabling the “Turn on Safe Attachments in block mode” feature is paramount in fortifying your organization's email security. Let's bolster your defense against malicious email attachments and stay ahead...
Microsoft Defender Secure Score Recommended Action (RA) – Create Safe Links policies for email messages
Welcome to my latest blog post! Today, we delve into the world of cybersecurity with a focus on enhancing email security. Specifically, we'll explore the implementation of a crucial Microsoft Defender Secure Score recommended action: 'Create Safe Links policies for...
Microsoft Defender Secure Score Recommended Action (RA) – Enable Microsoft Entra ID Identity Protection sign-in risk policies
Today we configure the Microsoft Defender Secure Score Recommended Action (RA) “Enable Microsoft Entra ID Identity Protection sign-in risk policies". This is a strategic action to battle against unauthorized access and identity breaches. Note: “Recommended action”...
KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932
This Blog Post intends to highlight a “proceed with caution” towards implementation of Microsoft KB5025885 associated with CVE-2023-24932 introduced in April 2024. KB5025885 is not routine and must be acted upon with convincing knowledge of its content and with...
Microsoft Defender Secure Score Recommended Action (RA) – Enable Conditional Access policies to block legacy authentication
This blog post reviews the essential recommended actions provided by Microsoft 365 Defender Secure Score: Enabling Conditional Access policies to block legacy authentication. Legacy authentication methods, often less secure than modern alternatives, can be a weak link...
Advanced Troubleshooting Failed Replacement of Physical Disk Storage Spaces Direct S2D / Azure Stack HCI
Troubleshooting Active Directory Account Lockouts with Lockoutstatus.exe
Hey Checkyourlogs Fans, Today, let's tackle a frustrating issue: recurring user account lockouts. This headache can affect any website or app lacking proper security measures. Recently, we ran into this problem with a fictional user named Dave at one of our clients'...
Troubleshooting Remote Connectivity Using netsh wlan show wlanreport
Hey Checkyourlogs Fans, In the modern landscape of remote work, maintaining seamless connectivity is paramount. However, as anyone grappling with VPN or wireless issues can attest, troubleshooting connectivity problems for remote users can be daunting. Enter netsh...
Real Time Logging using PowerShell (TAIL)
Hey Checkyourlogs Fans, Having the right tools is crucial in server troubleshooting. PowerShell is a go-to for many administrators, offering commands like Get-Content -Tail -Wait, which can be incredibly helpful, especially when monitoring real-time log files....
Microsoft Defender Secure Score Recommended Action (RA) – Ensure all forms of mail forwarding are blocked and/or disabled
In the intricate landscape of organizational cybersecurity, one often overlooked vector for data leakage and unauthorized access is the seemingly innocuous feature of mail forwarding. Microsoft Defender's Secure Score, a dynamic metric designed to evaluate and enhance...
Microsoft Defender Secure Score Recommended Action (RA) – Block users who reached the message limit
Good day security-aware colleagues. There is more on our agendas today than the Solar Eclipse. That being Security. In the realm of cybersecurity, maintaining a robust defensive posture is key to protecting an organization's digital assets. Microsoft Defender's Secure...
Split Brain DNS no problem with PortProxy NAT rules on Windows Servers
Hey Checkyourlogs Fans, In the intricate world of IT troubleshooting, encountering peculiar challenges is par for the course. Recently, I had the opportunity to assist a client grappling with a DNS Split Brain issue – a perplexing dilemma that had plagued their...
Unveiling S2D and Azure Stack HCI Monitoring with PowerShell
Hey Checkyourlogs Fans, Dave Kawula here, thrilled to share an invaluable insight into monitoring S2D (Storage Spaces Direct) and Azure Stack HCI environments. As an operator of these solutions, I understand the challenges of identifying and efficiently...
How to fix Veeam backup error-host is either not a cluster or has its cluster services unavailable
Today I am going to show you how to fix Veeam backup failed and showed host is either not a cluster or has its cluster services unavailable error message.
Bulk Delete SPAM Subscribers from WordPress
Hey Checkyourlogs Fans, Dave Kawula here, dropping in with a quick yet invaluable tip for all of you managing your WordPress sites. Picture this: you're diligently running your blog, pouring your heart and soul into crafting engaging content, only to find your efforts...
Microsoft Defender Secure Score Recommended Action (RA) – Ensure that intelligence for impersonation protection is enabled
Hey there, fellow tech aficionados! Steve here, back with another insightful blog post. Today, we're diving deepinto the realm of Microsoft Defender to explore a crucial recommended action: ensuring that intelligence for impersonation protection is enabled. This...
Introducing Steve Labeau: Navigating Microsoft Defender and Beyond
Greetings, tech enthusiasts! Today marks the beginning of an exciting journey into the world of Microsoft Defender and all things Microsoft Server and Hybrid related. I'm thrilled to kick off my inaugural blog post, sharing insights gained from over 30 years of...
Leveraging the Microsoft Defender Portal for Continuous Security Assessment and Action
In the realm of cybersecurity, vigilance is not just a practice, it's a necessity. For IT professionals charged with safeguarding digital infrastructure, continuous security assessment and action form the bedrock of a robust defense strategy. Enter the Microsoft...
Co-Pilot for Security 1st Look Integration with Microsoft Defender
Hey Checkyourlogs Fans, As we look at the 1st set of integration with our Microsoft Co-Pilot for Security with Defender, we can see a brand new Copilot option in the UI Not only this I’ve noticed now that the Co-Pilot integration happens automatically when reviewing...
Remediating CVE-2024-21404 .NET Denial of Service Vulnerability – Veeam Servers
Hey Checkyoulogs Fans, Today, we are going to look at vulnerability remediation for CVE-2024-21404. This is related to required updates of .Net and ASP.NET Core. This alert is currently tripping on Defender Endpoint with the following: Microsoft has instructions here...
Getting Started with Co-Pilot for Security
Hey Checkyourlogs Fans, Today, we are going to have at Microsoft’s newest flagship offering now in GA called Security for Co-Pilot. I felt that what a better way to celebrate the integration of AI and the Defender Suite than taking it for a test drive. Step 1 – will...
How to Configure Custom Safe Links Policies in Microsoft Defender for Office 365
Safe Links is a feature in Microsoft Defender for Office 365 (formerly known as Office 365 Advanced Threat Protection or ATP) that helps protect your organization from malicious hyperlinks in email messages. When an email contains a hyperlink, Safe Links checks the URL against a list of known malicious links. If the link is safe, the user can access the website normally. However, if the link is malicious, Safe Links blocks access to the website and alerts the user and administrators.
Migrate Physical Machine to Microsoft Failover Cluster
Let’s walk through the steps to perform a Physical to Virtual machine (P2V) conversion using Veeam Backup and Replication (VBR) to migrate a physical server to a Cluster virtual machine.
How to create custom Safe Attachments policies in Microsoft Defender for Office 365
In Microsoft Defender for Office 365, Safe Attachments is a feature that helps protect your organization from malicious email attachments. It automatically scans email attachments for potential threats, such as malware or viruses, before delivering them to recipients’ mailboxes.
How to create a Custom Quarantine Policy in Microsoft Deferent for Office 365
Creating a custom quarantine policy in Microsoft Defender for Office 365 involves configuring advanced threat protection settings to protect your organization’s email environment.
How to use the Microsoft Defender portal to assign Strict preset security policies to users
Strict preset security policies typically refer to predefined rules and guidelines designed to enhance security measures within an organization or system. These policies safeguard sensitive data, prevent unauthorized access, and mitigate potential security threats.
How to use the Microsoft Defender portal to assign Standard preset security policies to users
Microsoft Defender for Office 365 provides preset security policies to help organizations protect their Office 365 environment from various threats. These preset policies are designed to offer baseline protection and can be customized according to the organization’s specific requirements.
Navigating Compliance and Privacy in Microsoft Cloud Services
As the digital transformation accelerates, compliance and privacy have become cornerstones of any IT strategy. With organizations migrating to the cloud at an unprecedented pace, understanding the compliance and privacy aspects of Microsoft Cloud Services is critical....
Understanding the Impact of Artificial Intelligence on Cybersecurity with Microsoft AI
The role of Artificial Intelligence (AI) in cybersecurity has grown exponentially, and Microsoft’s Copilot for Security AI is at the forefront of this technological revolution. As IT professionals, understanding how AI can bolster cybersecurity efforts is paramount....
Microsoft Defender for Office 365-Configure trusted ARC sealers email authentication for Microsoft 365 Custom domains
Authenticated Received Chain (ARC) is a mechanism used in email authentication protocols to address the issues of message forwarding and intermediary handling of emails. It is designed to improve the reliability and security of email authentication systems like SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail).
Microsoft Defender for Office 365 – Configure DMARC email authentication for Microsoft 365 Custom Domains
Domain-based Message Authentication, Reporting, and Conformance (DMARC) builds upon SPF and DKIM to give domain owners greater control over how recipient servers handle their email messages. With DMARC, domain owners can specify policies instructing recipient servers on how to handle emails that fail SPF or DKIM checks. DMARC also enables domain owners to receive reports on email authentication results, allowing them to monitor and improve their email security posture.
Microsoft Defender for Office 365 – Configure DKIM email authentication for Microsoft 365 Custom domains
DomainKeys Identified Mail (DKIM) allows email senders to sign their outgoing emails digitally using cryptographic signatures. These signatures are stored as DKIM records in the domain’s DNS settings. Recipients’ mail servers can then use these signatures to verify that the email content has not been tampered with and originated from an authorized sender.
Microsoft Defender for Office 365-Configure SPF email authentication for Microsoft 365 domains
Microsoft Defender for Office 365 is a cloud-based email filtering service that helps protect businesses against advanced threats such as phishing and malware in emails, links, and collaboration tools like Microsoft Teams, SharePoint, and OneDrive. Formerly known as Office 365 Advanced Threat Protection (ATP), Microsoft Defender for Office 365 provides several features to enhance the security posture of an organization’s email and collaboration environment.
Exploring the Benefits of Windows Hello for Business in Cybersecurity
As IT professionals, we always look for innovative solutions that can enhance our organization’s cybersecurity posture. One such solution is Windows Hello for Business, a feature that has redefined secure authentication in the enterprise setting. In this blog post, we...
Windows Server Patching Without Configuration Manager
With many organizations transitioning their workstations from Active Directory to Entra ID, and having all co-management workloads in Intune, they are left with a bloated Configuration Manager environment that provides patching and OSD. As most hardware manufacturers...
Understanding the Role of Azure Sentinel in Modern Cybersecurity
In today's digital landscape, the proliferation of sophisticated cyber threats has necessitated more advanced and dynamic cybersecurity measures. Microsoft's Azure Sentinel stands at the forefront of this shift, serving as a scalable, cloud-native solution that...
Video: Introducing Windows Autopatch – A Leap Towards Automated Security
Introducing Windows Autopatch - A Leap Towards Automated Security In the dynamic world of IT, patch management may not be the most glamorous task, but it stands as the cornerstone of a robust cybersecurity strategy. As threats evolve and vulnerabilities become...
Optimizing Resource Allocation in Hyper-V Clusters
Resource allocation is at the core of efficient Hyper-V cluster management, dictating virtualized workloads' performance, scalability, and resilience. However, imbalances in resource allocation, encompassing CPU, memory, and storage, can precipitate performance...
Storage Failures in Hyper-V Cluster Management
Within the intricate web of Hyper-V cluster management, storage serves as the lifeblood, facilitating the seamless operation of virtualized workloads. However, the spectre of storage failures looms large, encompassing various issues ranging from disk failures to...
Navigating Network Configuration Challenges in Hyper-V Cluster Management
Network configuration stands as the foundational pillar of any virtualized environment, and this rings especially true in the realm of managing Hyper-V clusters. As organizations increasingly rely on Hyper-V clusters to support their critical workloads, the...
Mastering Cluster Quorum Management in Hyper-V Clusters: Ensuring Resilience and Availability
Cluster quorum serves as the cornerstone of resilience and availability in Hyper-V clusters, governing their ability to sustain operations in the face of node failures. However, the intricacies of quorum configurations present unique challenges, with misconfigurations...
Achieving Flexibility and Scalability: Unlocking the Power of Hybrid Cloud Solutions
In today's rapidly evolving digital landscape, businesses are constantly seeking ways to enhance flexibility and scalability while optimizing their IT infrastructure. Hybrid cloud solutions have emerged as a compelling strategy, offering organizations the ability to...
Leveraging Microsoft Defender for Endpoint Security Tips and Tricks
Everyone working in IT knows cyber threats are constantly evolving, so the need for robust endpoint security cannot be overstated. Microsoft Defender for Endpoint is a leading solution towards accomplishing a robust security strategy, offering an enterprise-grade...
Fix VBR 12.1.1 Backup Configuration Warning Failed to connect to Red Hat Virtualization plug-in…
This is a very interesting warning. I migrated many VBR servers, and it’s the first time I’ve encountered this warning.
The detailed warning message is below:
Warning Failed to connect to Red Hat Virtualization plug-in: Failed to login to platform service: The remote certificate is invalid according to the validation procedure.
How to upgrade to Citrix Virtual Apps 7 2311
Citrix released Virtual Apps 7 2311 on December 20, 2023. I will show you how to upgrade the existing Citrix Virtual Apps servers to Citrix Virtual Apps 7 2311.
CVE-2024-20253 Cisco Unified Communications Products Remote Code Execution Vulnerability
A flaw in some Cisco Unified Communications and Contact Center Solutions products could allow an unauthenticated, remote attacker to run arbitrary code on a vulnerable device.
If your customers use the products below, Please update the software ASAP.
Resolving Intune Enrollment Issues with Domain-Joined Workstations: A Novel Approach
Navigating the complexities of Microsoft-based platforms, IT professionals frequently encounter challenges in Intune enrollment, particularly with domain-joined workstations. This post aims to provide a clear and detailed solution to these issues, building upon the...
FIX KB5034439 – Failed to install 0x80070643 – January 2024 – CVE-2024-20666
Hey checkyourlogs fans, Earlier this month, it was reported that Windows Server 2022 Security Update KB5034439 was failing. This update was part of patch Tuesday and a fix for a BitLocker encryption bypass that allows users to access encrypted data CVE-2024-20666. If...
CVE-2024-20272 Cisco Unity Connection Unauthenticated Arbitrary File Upload Vulnerability
Cisco Security Advisory was released today about the Cisco Unity Connection Unauthenticated Arbitrary File Upload Vulnerability.
The Evolution of Cybersecurity Insights from Microsoft’s 2023 Digital Defense Report
In the realm of IT, where the only constant is change, Microsoft's 2023 Digital Defense Report emerges as a vital resource, offering a panoramic view of cybersecurity's evolution. In this blog, I’ll distill its insights into actionable strategies for C-suite...
Securing IoT Devices with Azure Sphere A Step-by-Step Approach
Securing devices is a top priority for IT professionals in the Internet of Things (IoT) era. With threats evolving and multiplying, it's essential to employ robust security measures. Azure Sphere from Microsoft is a solution designed to secure IoT devices at every...
How to use QNAP as object storage for Veeam Backup and Replication 12.1 with Immutability Backup
QNAP QuObjects application is free and certificated for objects with immutability, which means you can use it as object storage within Veeam for a backup repository that supports their immutability feature.
The Future of Cybersecurity Predictions Based on Microsoft’s Research
Cybersecurity stands as one of the most pressing concerns for any organization today. With the rapid evolution of technology and an increasing dependence on digital infrastructure, the scope and scale of cyber threats continue to grow. Based on the latest...
Best Practices for Secure Remote Work Using Teams
In the era of remote work, security concerns around collaboration tools have skyrocketed. Microsoft Teams, a cornerstone for many remote work environments, is no exception. As IT pros, we enable and secure the digital workspace. In this blog, I provide a strategic...
Fix Sending e-mail report issue after upgrade to Veeam Backup and Replication 12.1
The email notifications are not working after upgrading from v11 to v12 (v12.1), including sending the test email.
There are warnings on the backup jobs: ” Sending e-mail report Details: The remote certificate is invalid according to the validation procedure. “
Deploying Microsoft Defender for Identity to Protect Against Advanced Threats
In today's threat landscape, advanced and targeted cyberattacks have become the norm rather than the exception. As IT pros, it's imperative to have tools and strategies in place to protect against these sophisticated threats. One such tool is Microsoft Defender for...
Free Workshop: Introducing Winget
I know this isn't much of a blog article, but since Winget is a niche technology, I felt it would help to get the word out about a three-hour workshop I am doing on February 7 for Winget. The high-level agenda is as follows:...
How to Cutover the Client Access namespace to Exchange 2019
To transition the client access namespace to Exchange Server 2019, change the DNS record for the client access namespace to the Exchange Server 2019 environment.
The case of C:\ProgramData\Microsoft\Crypto\SystemKeys blocking upgrade of Windows Server 2016 to 2019
Hey Checkyourlogs Fans, I recently had a case of a stalled Windows upgrade that ended up being caused by a bug in the Manage Engine Desktop Central Distribution Server component. This was a poorly written application creating 3 million+ files in...
MDE and DUO Status Report – #PowerShell #MDE
Hey Checkyourlogs Fans, Today I was asked by a client to verify the deployment of MDE and Cisco DUO in an infrastructure. As many servers are being added and removed, I felt it would be best to run this as a PowerShell Script scheduled Daily. This was an easy script...
Enhancing Your Security Posture with Microsoft Secure Score
Securing your organization's data and infrastructure is paramount in the digital age. As an IT professional, you're on the front lines of this effort, and one of the most effective tools at your disposal is the Microsoft Secure Score. This metric, provided within the...
How to fix Feature S2D is not supported – #AZ800 #AZ801 #S2D #HCI #WindowsServer2022
Hey Checkyourlogs Fans, Today, I was working with one of my students in my Master Storage Spaces Direct class, and they had inadvertently installed Windows Server 2022 Standard into their LAB HCI Nodes. He is currently studying for his AZ800 and AZ801 hybrid Windows...
How to Use Entra ID for Identity and Access Management
The Identity and Access Management (IAM) landscape is constantly evolving, and Microsoft's Entra ID is at the forefront of this transformation. Entra ID, part of the Microsoft Entra suite, is a robust identity and access management solution that IT professionals must...
Automating Security Responses with Power Automate
In the dynamic realm of cybersecurity, rapid response to threats can be the difference between a minor incident and a catastrophic breach. This is where automation becomes a game-changer. Microsoft Power Automate, formerly known as Microsoft Flow, empowers IT...
Troubleshooting Failed to get VM (GUID) config Path WMI empty Result – #Veeam #VeeamVanguard #S2D
Hey Checkyourlogs Fans, Today, I was asked to troubleshoot some failing Veeam Replica jobs for a couple of VMs inside of a 4-node S2D Cluster. The issue presented itself as failing jobs for a couple of VMs giving the following error message: Failed to process...
Fix failed to create website error on installing Veeam Backup Enterprise Manager 12.1 with Microsoft Defender Advanced Threat Protection
When you try to install or upgrade the Veeam Backup Enterprise Manager 12.1, it might fail to create a website, and the error code is 0x80070020.
How to Install Backup for Microsoft 365 v7a
Veeam released the version of Veeam Backup for Microsoft 7a on December 5, 2023. The Cumulative patches contain Veeam Backup and replication v12.1 compatibility and the ability to set email notifications with Google and M365 accounts in Veeam Explorers.
Determining Original OS Install Date – S2D HCI AZHCI
Hey Checkyourlogs Fans, A client recently asked me if we could tell when a couple of S2D HCI Nodes were installed. We are in the process of upgrading and replacing them, but we were wondering about the original install date. This is easy to determine. You can open an...
Find WDS Servers deployed in your infrastructure – #PowerShell
Hey Checkyourlogs Fans, A client asked me today to find rogue WDS Servers serving up PXE offers to clients on subnets. This was interesting because we use WDS quite a bit to re-image Fabric Nodes and S2D/AZHCI nodes. It is entirely possible that one was left running....
How to Install Veeam Backup Enterprise Manager 12.1
Veeam Backup Enterprise Manager is a centralized management and reporting tool designed by Veeam Software for overseeing Veeam Backup & Replication deployments. It allows administrators to control and monitor their backup infrastructure through a web-based...
Veeam Failing back to a previous generation Hyper-V Host new in V12.
Hey Checkyourlogs Fans, One of the little-known feature updates with Veeam V12 was the ability to fail back to an older Hyper-V Host finally. Listed here in the what's new in Veeam V12 document - https://www.veeam.com/veeam_backup_12_0_whats_new_wn.pdf The...
Troubleshooting Veeam and Hyper-V Key Protector could not be unwrapped on Replica Failover
Hey Checkyourlogs Fans, Today I was doing some maintenance and planned failovers using Veeam between a Server 2019 and 2022 S2D Cluster and ran into the following trying to start one of the VM's. The key protector could not be unwrapped. Details are included in the...
How to Install Veeam Backup and Replication Console 12.1
When you install Veeam Backup & Replication v12.1, the Veeam Backup & Replication console 12.1 is automatically installed on the backup server. If you want to remotely access Veeam Backup & Replication v12.1, install the Veeam Backup & Replication console 12.1 on a dedicated machine.
How to Install Veeam Backup and Replication 12.1
When you install Veeam Backup & Replication v12.1, the Veeam Backup & Replication console is automatically installed on the backup server. If you want to access Veeam Backup & Replication remotely, you can install the Veeam Backup & Replication console on a dedicated machine.
How to Install Hyper-V integration services in the ubuntu Linux VM
Today, I will show you how to install Hyper-V integration services in the Ubuntu Linux VM of Hyper-V. If the Hyper-V integration services are not installed, you cannot restore any data from Veeam Backup.
FIX Veeam VBM365 backup with “There is an error in XML document” Error
Veeam Backup for Microsoft 365 has an error in one of the mailboxes. The error message is “There is an error in XML document…The specified type was not recognized: name=’SharingMessage’.
Fix Windows Server 2022 (2019) Recovery partition to prevent C drive extend volume issues
When you try to extend the C drive from the Disk Manager tool but the Extend volume greys out, the recovery partition prevents the C drive from extending the volume.
How to upgrade Veeam Backup for Microsoft 365 to v7a
Veeam released version of Veeam Backup for Microsoft 7a on December 5, 2023. The Cumulative patches contain Veeam Backup and replication v12.1 compatibility and the ability to set email notifications with Google and M365 accounts in Veeam Explorers.
Defender Endpoint Recommendation – Change service executable path to a common protected location
Hey Checkyourlogs Fans, Today, we will look at a Security Recommendation regarding a Service Executable Path not being in a safe location via Microsoft Defender Endpoint. Changing the service executable path to a common protected location is a crucial aspect of...
Fixing ODBC CVE-2023-36730 and more on Veeam Servers #Veeam #Veeam Vanguard
Hey Check Your Logs Fans, Recently, Microsoft Defender Endpoint has identified a bunch of CVEs related to Microsoft ODBC, which is installed on Veeam VBR and Console Servers. These need to be updated, and this post serves as a process to fix the following CVE's: With...
Fixing OLEDB CVE-2023-36417 and more on Veeam Servers
Hey Checkyourlogs Fans, We are continuing with our recent fixes for CVEs released for Veeam Servers. The next one in this series deals with OLEDB versions that can be exploited. We will focus on the latest one in this list as, once again, patching the latest CVE...
Fixing CVE-2023-36558 Veeam Servers #Veeam #VeeamVanguard
Hey Check your logs fans, Today, we will work on new vulnerabilities on some of our Veeam VBR/Veeam One/VBO - Servers. When the product is installed, some .net core dependencies get installed. Like anything on our application servers, these are vulnerable to...
Coming Back Home Migrating away from Mimecast to Native Office 365
We have been a faithful customer of Mimecast for the past 4-5 years, and the experience has been good for us. At the time of our moving to Mimecast, Microsoft didn't have all of the Defender for Office 365 features readily available, and we were getting bombarded with...
How to Upgrade Veeam Backup and Replication with Hardened Repository to v12.1
Veeam Backup & Replication 12.1 is the newer build of version 12, and the major new features and enhancements were added in Veeam Backup & Replication v12.1. e.g. Detect and identify cyber threats, Respond and recover faster from malware, Ensure security and compliance, Veeam App for ServiceNow, Backup of object storage, Veeam CDP enhancements, Veeam AI Assistant, etc.
Using Microsoft’s Cybersecurity Reference Architectures for Your Organization’s Security Strategy
In the constantly evolving world of cybersecurity, developing a robust security strategy is a challenging yet vital task for every organization. Microsoft’s Cybersecurity Reference Architectures provide a valuable framework for creating comprehensive security plans....
Implementing Zero Trust with Microsoft 365 A Practical Guide
Today, I want to delve into a security model that's been garnering a lot of attention: Zero Trust, specifically within the ecosystem of Microsoft 365. Introduction to Zero Trust Zero Trust is not just a buzzword; it's a shift from the traditional "trust but verify"...
CVE-2023-28388 – Intel Chipset Driver Software – Impacting Intel Servers #S2D #Veeam
Hey Checkyourlogs Fans, On November 16th a CVE was issued for Intel Chipset Device Software Version prior to 10.1.19444.8378. Microsoft Defender Endpoint is reporting on this as well and it is immediately advised to update your intel servers....
How to Test the Client Access Namespaces for Exchange 2019 Server
Testing the client access namespaces after configuring them ensures clients can connect to the Exchange Server 2019 services without issues.
Entra Verified ID
Why!? Talking about emerging technologies is tricky because you never know if you are "catching it early" or is it something with very limited shelf life as another solution comes along. I've found the decentralized approach to identity as a potential use case the...
Restore VM Files at Veeam Backup and Replication v12
You can restore VM files (XML, VMCX, VMRS, VMGS, VHD, VHDX) if they become corrupted. This option is an excellent alternative to restoring the entire VM. You can only restore a single VM file.
Secure Restore the Entire VM to the New Location at Veeam Backup and Replication v12
Existing jobs do not need to be updated that process the original/recovered VMs if you restore them to the same host and choose to preserve VM UUIDs. If you configure restore differently and want to process the recovered VMs, you must edit existing jobs or create new ones.
How to configure the Client Access Namespaces for Exchange 2019 Server
Configuring the client access namespaces ensures clients can connect to Exchange Server 2019 using the correct URLs for each service. They help to ensure a smooth user experience and avoid issues such as certificate errors and connection failures.
How to Configure the Autodiscover Services Connection Point (SCP) for Exchange 2019 Server
The Autodiscover service connection point (SCP) provides information to domain-joined Outlook clients on connecting to the Autodiscover service for automatic client configuration.
How to restore the Entire VM to the Original Location with Secure Restore at Veeam Backup and Replication v12
If the original VM fails, you can use Veeam Backup & Replication to restore an entire VM from a backup file to the most recent state or a previous point.
How to Install SSL Certificate for Exchange Server 2019
We can reuse the existing SSL certificate for the new Exchange 2019 server.
How to fix Veeam FLR error -Secondary GPT header LBA 209715199 exceeds the size of the disk (86401630720) at Veeam Backup and replication v12
VBR v12 guest file restore—happen error message is as below:
Secondary GPT header LBA 209715199 exceeds the size of the disk (86401630720)
Agent failed to process method {Mount.GenericMount)
How to Install Exchange Server 2019 Mailbox Role server
The Exchange Server 2019 Mailbox role server manages mailbox databases, which store user mailboxes and public folders. It also manages message transport and performs functions like filtering, antivirus and antispam protection, and content indexing.
How to permanent failover of the virtual machine at Veeam Backup and Replication v12
Permanent failover is one method of completing failover. Permanent failover means permanently switching from the original VM to its replica.
The VM replica ceases to be a replica due to permanent failover and becomes the production VM.
How to prepare Active Directory for deployment Exchange Server 2019
Preparing Active Directory for Exchange Server 2019 involves several important steps to ensure your organization’s environment is ready to support Exchange Server.
How to failback to the specified location of the Production Site at Veeam Backup and Replication v12
For the Failback to the specified location, Veeam Backup & Replication must transfer the entire VM data, including its configuration and virtual disc content. Choose this option if you cannot use the original VM or restore it from a backup.
How to upgrade Citrix NetScaler (ADC) to 14.1
Citrix released the new NetScaler 14.1 build version on September 26, 2023.
I will show you how to upgrade the existing Citrix NetScaler to Citrix NetScaler 14.1.
How to failback to the original virtual machine restored in a different location at Veeam Backup and Replication v12
Because Veeam Backup & Replication only needs to transfer differences between the original/recovered VM and VM replica, the failback to the original virtual machine restored in a different location option helps reduce recovery time and network traffic.
Expanding a 3-Way Mirror Volume in S2D or AZHCI in Depth #S2D #AZHCI #PowerShell
Hey Checkyourlogs Fans, Quick post here: a customer asked me to expand a Virtual Disk inside a 4-node S2D Cluster running Server 2019 today. I thought I had this documented online, but I couldn't find it, so here is a fresh post on how to do this with PowerShell. The...
How to upgrade to Citrix Virtual Apps 7 2308
Citrix released Virtual Apps 7 2308 on September 14,2023.
I will show you how to upgrade the existing Citrix Virtual Apps servers to Citrix Virtual Apps 7 2308.
How to failback to the original virtual machine of the Production Site at Veeam Backup and Replication v12
Failback is returning operations to the primary site after a disaster recovery event. It reverses the failover process by replicating any changes made to the virtual machine during the Failover state back to the primary site and then redirecting users and applications back to the primary site.
How to Migrate Microsoft Entra Connect (Azure AD Connect) to v2
Today, I will show you how to migrate Microsoft Entra Connect (Azure AD Connect) to v2.
How to fix Content Security Policy (CSP) Missing
The Content Security Policy provides a valuable safety net that protects your website from malicious cross-site scripting (XSS) attacks. A well configured policy will stop an attacker attempting to inject their code, or references to other malicious content, into your website. Without a Content Security Policy, it’s easy for website developers to make mistakes that allow an attacker to inject content that changes the way the website behaves.
How to Plan Failover virtual machine to Disaster Recover Site at Veeam Backup and Replication v12
Planned failover is the smooth manual switching from a primary VM to its replica with minor downtime. Planned failover is proper when you know primary VMs are planning to go offline, and you need to switch the workload from the original VMs to their replicas as soon as possible. For example, you can use planned failover to perform data center migration, maintenance, or software upgrades on primary VMs. You can also perform planned failover if you see signs of an impending disaster.
How to fix installing Microsoft Entra Connect V2 (Azure AD Connect V2) error code 2503, 2502
When you try to install the Microsoft Entra Connect V2 (Azure AD Connect V2) and it happens the installer has encountered an unexpected error installing this package. The error code is 2503 and 2502.
How to undo failover the virtual machine to Production Site at Veeam Backup and Replication v12
One method for completing failover is to use failover undo. When you undo failover, you return to the original VM from a VM replica. When a virtual machine replica is in the Failover state, Veeam Backup & Replication discards all changes made to the replica. This is because the Failover state is intended to be a temporary state used to restore the virtual machine to operation quickly in the event of a disaster.
How to Failover virtual machine to Disaster Recovery Site at Veeam Backup and Replication v12
Failing over a virtual machine to a disaster recovery site involves replicating the virtual machine and its data to the disaster recovery site and then activating the replicated copy in the event of a disaster or other disruptive event that renders the original virtual machine unavailable.
How to Install Microsoft 365 Apps on a Microsoft Remote Desktop Service Server
Microsoft 365 Apps are installed on a machine is set up as a Remote Desktop Session Host server. This allows several users to connect to this computer remotely. Users can operate Office programs like Word or Excel at the same time. The overall procedure for the Project and Visio desktop programs is the same.
How to create a Replication job with seeding to the Disaster Recovery Site at Veeam Backup and Replication v12
This procedure creates a replication job with seeding to replicate the specified VMs to the disaster recovery site. If a disaster strikes and the production VM stops working properly, you can fail over to its replica.
How to create a Replication job to replicate the specified VMs to the Disaster Recovery Site at Veeam Backup and Replication v12
This procedure creates a replication job to replicate the specified VMs to the disaster recovery site. If a disaster strikes and the production VM stops working properly, you can fail over to its replica.
How to create a Replication job to replicate the specified VMs at Veeam Backup and Replication v12
This procedure creates a replication job to replicate the specified production virtual machines at the same production site.
How to create a Backup Copy Job with Periodic copy from the backup job workload at Veeam Backup and Replication v12
Periodic copy jobs can be scheduled to run during non-business hours or low-activity periods, reducing the impact on production systems. This allows you to efficiently manage backup and copy operations without causing disruption.
How to create a Backup Copy Job with Immediate copy from the backup job workload at Veeam Backup and Replication v12
Immediate copies help reduce your RPO, which is the maximum allowable data loss in the event of a disaster. By creating copies as soon as new data is backed up, you ensure that your data loss is minimal.
How to create a Backup job to backup the VMS portion of the Hyper-V Host at Veeam Backup and Replication v12
This process creates a backup job to backup the VMS of the Hyper-V host but not all of them.
Microsoft Unveils FIDO2 Passkey Authentication for Windows Users
September 26, 2023 - In a significant move to bolster cybersecurity while enhancing user experience, Microsoft has recently introduced support for passkeys in Windows 11 and Windows 10, which is a revolutionary authentication method that is set to change the way users...
How to Install Cumulative Patches P20230718 for Veeam Backup & Replication Console 12
You also need to install Cumulative Patches P20230718 for Veeam Backup & Replication Console 12 after installation to Veeam Backup & Replication 12 management server.
How to Install Veeam Backup & Replication 12 Cumulative Patches P20230718
Veeam Backup & Replication 12 cumulative patch P20230718 was released on March 07, 2023, and last modified on August 03, 2023.
How to Install Exchange 2019 Mailbox Server Role Prerequisites
Microsoft provides detailed documentation and tools to assist with the deployment process, but consulting with an experienced Exchange consultant or engineer is recommended to ensure a successful deployment.
The specific steps and requirements for deploying Exchange Server 2019 may vary depending on your environment and business needs.
How to create a Backup job to backup all VMS of the Hyper-V Host at Veeam Backup and Replication v12
This procedure creates a backup job to back up all VMS of the production Hyper-V host. The new VMS will be backed up automatically after the backup job is created. You don’t need to modify the backup job settings.