Select Page

Classic Blog

Real Time Logging using PowerShell (TAIL)

Hey Checkyourlogs Fans, Having the right tools is crucial in server troubleshooting. PowerShell is a go-to for many administrators, offering commands like Get-Content -Tail -Wait, which can be incredibly helpful, especially when monitoring real-time log files....

Bulk Delete SPAM Subscribers from WordPress

Hey Checkyourlogs Fans, Dave Kawula here, dropping in with a quick yet invaluable tip for all of you managing your WordPress sites. Picture this: you're diligently running your blog, pouring your heart and soul into crafting engaging content, only to find your efforts...

Getting Started with Co-Pilot for Security

Hey Checkyourlogs Fans, Today, we are going to have at Microsoft’s newest flagship offering now in GA called Security for Co-Pilot. I felt that what a better way to celebrate the integration of AI and the Defender Suite than taking it for a test drive. Step 1 – will...

How to Configure Custom Safe Links Policies in Microsoft Defender for Office 365

Safe Links is a feature in Microsoft Defender for Office 365 (formerly known as Office 365 Advanced Threat Protection or ATP) that helps protect your organization from malicious hyperlinks in email messages. When an email contains a hyperlink, Safe Links checks the URL against a list of known malicious links. If the link is safe, the user can access the website normally. However, if the link is malicious, Safe Links blocks access to the website and alerts the user and administrators.

Microsoft Defender for Office 365-Find the Domain Name of the Trusted ARC Sealers from the Message Header

An email message internet header is a metadata set containing information about the sender, recipient, routing, and delivery of an email. It can help you find the domain name of the trusted ARC sealers. The domain name must match the domain specified in the d value of the ARC-Seal and ARC-Message-Signature headers in affected messages.

Microsoft Defender for Office 365-Configure trusted ARC sealers email authentication for Microsoft 365 Custom domains

Authenticated Received Chain (ARC) is a mechanism used in email authentication protocols to address the issues of message forwarding and intermediary handling of emails. It is designed to improve the reliability and security of email authentication systems like SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail).

Microsoft Defender for Office 365 – Configure DMARC email authentication for Microsoft 365 Custom Domains

Domain-based Message Authentication, Reporting, and Conformance (DMARC) builds upon SPF and DKIM to give domain owners greater control over how recipient servers handle their email messages. With DMARC, domain owners can specify policies instructing recipient servers on how to handle emails that fail SPF or DKIM checks. DMARC also enables domain owners to receive reports on email authentication results, allowing them to monitor and improve their email security posture.

Microsoft Defender for Office 365 – Configure DKIM email authentication for Microsoft 365 Custom domains

DomainKeys Identified Mail (DKIM) allows email senders to sign their outgoing emails digitally using cryptographic signatures. These signatures are stored as DKIM records in the domain’s DNS settings. Recipients’ mail servers can then use these signatures to verify that the email content has not been tampered with and originated from an authorized sender.

Microsoft Defender for Office 365-Configure SPF email authentication for Microsoft 365 domains

Microsoft Defender for Office 365 is a cloud-based email filtering service that helps protect businesses against advanced threats such as phishing and malware in emails, links, and collaboration tools like Microsoft Teams, SharePoint, and OneDrive. Formerly known as Office 365 Advanced Threat Protection (ATP), Microsoft Defender for Office 365 provides several features to enhance the security posture of an organization’s email and collaboration environment.

Optimizing Resource Allocation in Hyper-V Clusters

Resource allocation is at the core of efficient Hyper-V cluster management, dictating virtualized workloads' performance, scalability, and resilience. However, imbalances in resource allocation, encompassing CPU, memory, and storage, can precipitate performance...

Storage Failures in Hyper-V Cluster Management

Within the intricate web of Hyper-V cluster management, storage serves as the lifeblood, facilitating the seamless operation of virtualized workloads. However, the spectre of storage failures looms large, encompassing various issues ranging from disk failures to...

Fix VBR 12.1.1 Backup Configuration Warning Failed to connect to Red Hat Virtualization plug-in…

This is a very interesting warning. I migrated many VBR servers, and it’s the first time I’ve encountered this warning.
The detailed warning message is below:
Warning Failed to connect to Red Hat Virtualization plug-in: Failed to login to platform service: The remote certificate is invalid according to the validation procedure.

Determining Original OS Install Date – S2D HCI AZHCI

Hey Checkyourlogs Fans, A client recently asked me if we could tell when a couple of S2D HCI Nodes were installed. We are in the process of upgrading and replacing them, but we were wondering about the original install date. This is easy to determine. You can open an...

How to Install Veeam Backup Enterprise Manager 12.1

Veeam Backup Enterprise Manager is a centralized management and reporting tool designed by Veeam Software for overseeing Veeam Backup & Replication deployments. It allows administrators to control and monitor their backup infrastructure through a web-based...

How to Install Veeam Backup and Replication 12.1

When you install Veeam Backup & Replication v12.1, the Veeam Backup & Replication console is automatically installed on the backup server. If you want to access Veeam Backup & Replication remotely, you can install the Veeam Backup & Replication console on a dedicated machine.

How to Upgrade Veeam Backup and Replication with Hardened Repository to v12.1

Veeam Backup & Replication 12.1 is the newer build of version 12, and the major new features and enhancements were added in Veeam Backup & Replication v12.1. e.g. Detect and identify cyber threats, Respond and recover faster from malware, Ensure security and compliance, Veeam App for ServiceNow, Backup of object storage, Veeam CDP enhancements, Veeam AI Assistant, etc.

Entra Verified ID

Why!? Talking about emerging technologies is tricky because you never know if you are "catching it early" or is it something with very limited shelf life as another solution comes along. I've found the decentralized approach to identity as a potential use case the...

How to fix Content Security Policy (CSP) Missing

The Content Security Policy provides a valuable safety net that protects your website from malicious cross-site scripting (XSS) attacks. A well configured policy will stop an attacker attempting to inject their code, or references to other malicious content, into your website. Without a Content Security Policy, it’s easy for website developers to make mistakes that allow an attacker to inject content that changes the way the website behaves.

How to Plan Failover virtual machine to Disaster Recover Site at Veeam Backup and Replication v12

Planned failover is the smooth manual switching from a primary VM to its replica with minor downtime. Planned failover is proper when you know primary VMs are planning to go offline, and you need to switch the workload from the original VMs to their replicas as soon as possible. For example, you can use planned failover to perform data center migration, maintenance, or software upgrades on primary VMs. You can also perform planned failover if you see signs of an impending disaster.

How to undo failover the virtual machine to Production Site at Veeam Backup and Replication v12

One method for completing failover is to use failover undo. When you undo failover, you return to the original VM from a VM replica. When a virtual machine replica is in the Failover state, Veeam Backup & Replication discards all changes made to the replica. This is because the Failover state is intended to be a temporary state used to restore the virtual machine to operation quickly in the event of a disaster.

How to create an Immutable Backup job to backup the specified VMs at Veeam Backup and Replication v12

Immutable Backup is a Veeam Backup & Replication feature that protects against ransomware attacks by preventing malicious software from modifying or deleting backup data.

Immutable backup means that once data is written to a backup repository, it cannot be modified, overwritten, or deleted until a specified retention period has passed. This can prevent ransomware from corrupting or encrypting backup data because the malware cannot modify or delete the backup files.

How to enable Configuration Backup at Veeam Backup and Replication v12

The configuration database of Veeam Backup & Replication can be backed up and restored. If the backup server fails, you can quickly reinstall it and restore its configuration from a backup configuration.
You can also use configuration backups to restore the configuration from one backup server to another in the backup infrastructure. Veeam Backup & Replication exports configuration data from the database and saves it to the backup repository during configuration backup.

How to configure Group Managed Service Accounts (gMSA) at Veeam Backup and Replication v12

A Group Managed Service Account (gMSA) is a domain account that can be configured on the server. The Microsoft Windows operating system manages the password, so the administrator does not need to manage the password. Complex passwords are generated randomly and changed every 30 days, reducing the risk of brute force and dictionary attacks.

How to install Veeam Backup and Replication Console 12

When you install Veeam Backup & Replication, the Veeam Backup & Replication console is automatically installed on the backup server. If you want to access Veeam Backup & Replication remotely, you can install the Veeam Backup & Replication console on a dedicated machine.

How to install Veeam Backup and Replication v12 with Microsoft SQL (or Express)

You can choose Microsoft SQL as a Veeam Backup & Replication database. You were installing a Microsoft SQL Server (or Express), either locally on the backup manager server or remotely. If Microsoft SQL Server is not already installed. In that case, the Veeam Backup & Replication won’t install the Microsoft SQL Server Express Edition on the backup server automatically. You must install it before installing Veeam Backup and Replication v12 version.

How to install Veeam Backup and Replication v12 with PostgreSQL

When you install Veeam Backup & Replication, the Veeam Backup & Replication console is automatically installed on the backup server.
You can choose PostgreSQL as a Veeam Backup & Replication database. It has no size limit or computes restrictions and has improved performance over SQL Express.

Installing Winget on Windows 10

Introduction In many ways the installation of Winget can be transparent to the user if they use the Windows store but for newly provisioned or older Windows 10 devices the installation for Winget via a script isn’t quite as simple as it should be. In this blog post...

Techmentor 2023: Redmond

This conference offers a unique opportunity to interact, learn, and problem-solve with a broad cross-section of technology professionals, but it goes far beyond that. Techmentor emphasizes practical application, with sessions that dive deep into technical details and...

Troubleshooting MDE ATP Agent Issues

As an IT administrator, it's essential to ensure that all devices in your organization are protected with the latest security tools and updates. Microsoft Defender for Endpoint (MDE) is a powerful security tool that helps protect endpoints and servers from various...

How to Fix Prepare AD Schema Error at Installing the Exchange 2016 Cumulative Update 23

Today, I helped a client migrate Exchange from 2010 to 2019. As you know, Exchange 2010 can’t migrate to 2019 directly. You need to migrate Exchange from 2010 to 2016 and then 2019.
When I tried to prepare the AD schema for installing Exchange 2016 CU23, and it happened the error message is below.
“One or more servers in the existing organization are running Exchange 2000 Server or Exchange Server 2003”.
The error is because they were not uninstalled Exchange 2000 or 2003 completed. Let’s fix it.

The do’s and don’ts of Azure Immutable Storage

Azure Immutable Storage has been in the market for a while, and this was one of my more anticipated capabilities. In this blog post I want to give you some insight to it’s use as it’s been in place for a while now and we see a lot of ecosystem and independent software...

Top 10 Cyber Insurance Gotchas for 2023

Cyber insurance is a crucial investment for businesses that want to protect themselves from cyber threats. However, businesses should be aware of some potential "gotcha's" when selecting and utilizing their cyber insurance policy. This blog post will discuss the top...

Women in IT preparing to learn Microsoft Azure

Microsoft Azure has quickly become one of the world's most popular cloud computing platforms. With businesses of all sizes moving their applications and infrastructure to the cloud, IT professionals must have the skills to manage and maintain Azure environments. This...

How to Install Veeam Backup & Replication 12 Cumulative Patches P20230223

Vulnerability in this Veeam Backup & Replication component allows unauthorized users to obtain encrypted credentials stored in the configuration database. The vulnerability may lead to these unauthorized users gaining access to backup infrastructure hosts. The vulnerable process Veeam.Backup.Service.exe (TCP 9401 by default) allows unauthenticated users to request encrypted credentials.
Veeam released new patches to fix this vulnerability on March 7, 2023. No Hosts restart is required after installing this patch.

How to Install Veeam Backup & Replication 11a Cumulative Patches P20230227

Vulnerability in this Veeam Backup & Replication component allows unauthorized users to obtain encrypted credentials stored in the configuration database. The vulnerability may lead to these unauthorized users gaining access to backup infrastructure hosts. The vulnerable process Veeam.Backup.Service.exe (TCP 9401 by default) allows unauthenticated users to request encrypted credentials.
Veeam releases new patches to fix this vulnerability. No Hosts restart is required after installing this patch.