Select Page

Classic Blog

How to Upgrade Veeam Backup for Microsoft 365 to v8.1

Veeam released a version of Veeam Backup for Microsoft 365 v8.1 on January 23, 2025, and it has some enhancements, including support for Ubuntu 24.04 and RedHat 9.4 as backup proxy operating systems, multiple stability, performance, and scalability improvements delivered to ensure product reliability. It also resolved some issues.

Troubleshooting Azure Web Apps Using Kudu+

Hey Checkyourlogs Fans, Azure Web Apps is a robust platform-as-a-service (PaaS) offering that enables developers to seamlessly deploy, manage, and scale web applications. However, troubleshooting issues in production environments can be daunting, especially when...

Critical Error – Your Start Menu isn’t working,

Hey Checkyourlogs Fans, Today, while patching some server infrastructure, I encountered an interesting issue. When I clicked on the Start menu, I received a Critical Error message: “Your Start menu isn’t working. We’ll try to fix it the next time you sign in.” Sign...

TechMentor Live! 360 Speaker Experience

Last week, I had the exciting and rewarding opportunity to participate in TechMentor Live! 360 Orlando as a speaker. The sessions were "Security Is Not Meant to Be a Matter of Convenience" and "Advanced Configuration of Microsoft Defender for Endpoint." As it was my...

Navigating Installation Delays During Veeam 12.2 Upgrade

Recently, while upgrading Veeam to version 12.2, I encountered an issue that added approximately 45 minutes to the expected installation time. The delay wasn't due to anything malfunctioning with Veeam itself; it was related to Windows Defender SmartScreen, the...

How to Upgrade Veeam Backup for Microsoft 365 to v8

Veeam released a version of Veeam Backup for Microsoft 365 v8 on September 11, 2024, and includes Immutable backups with the ability to store on any object storage, Enterprise scale and efficiency delivered by Veeam Proxy Pools, Backup for private and shared Teams channels, and Linux-based backup proxies…

Introducing Zero Trust DNS

Introduction Strangely, identity and name resolution have become interesting to me as they essentially underpin the infrastructure of the modern Internet. In some ways, the industry has given up on the security of DNS, with its ability to be susceptible to...

Embracing the Next Chapter: Leveraging My Three Decades of IT Experience to Drive Organizational Transformation and Nurture Future IT Leaders

Embracing a New Chapter: Leveraging Three Decades of IT Experience to Drive Organizational Transformation and Nurture Future IT Leaders After an incredible journey spanning three decades in the IT industry, filled with countless challenges, triumphs, and invaluable...

Ensure that mailbox intelligence is enabled

Welcome to our guide on implementing a crucial recommendation from Microsoft Defender Secure Score: Ensuring that mailbox intelligence is enabled. In today's digitally interconnected world, email remains a primary conduit for communication, but it's also a prime...

Real Time Logging using PowerShell (TAIL)

Hey Checkyourlogs Fans, Having the right tools is crucial in server troubleshooting. PowerShell is a go-to for many administrators, offering commands like Get-Content -Tail -Wait, which can be incredibly helpful, especially when monitoring real-time log files....

Bulk Delete SPAM Subscribers from WordPress

Hey Checkyourlogs Fans, Dave Kawula here, dropping in with a quick yet invaluable tip for all of you managing your WordPress sites. Picture this: you're diligently running your blog, pouring your heart and soul into crafting engaging content, only to find your efforts...

Getting Started with Co-Pilot for Security

Hey Checkyourlogs Fans, Today, we are going to have at Microsoft’s newest flagship offering now in GA called Security for Co-Pilot. I felt that what a better way to celebrate the integration of AI and the Defender Suite than taking it for a test drive. Step 1 – will...

How to Configure Custom Safe Links Policies in Microsoft Defender for Office 365

Safe Links is a feature in Microsoft Defender for Office 365 (formerly known as Office 365 Advanced Threat Protection or ATP) that helps protect your organization from malicious hyperlinks in email messages. When an email contains a hyperlink, Safe Links checks the URL against a list of known malicious links. If the link is safe, the user can access the website normally. However, if the link is malicious, Safe Links blocks access to the website and alerts the user and administrators.

Microsoft Defender for Office 365-Find the Domain Name of the Trusted ARC Sealers from the Message Header

An email message internet header is a metadata set containing information about the sender, recipient, routing, and delivery of an email. It can help you find the domain name of the trusted ARC sealers. The domain name must match the domain specified in the d value of the ARC-Seal and ARC-Message-Signature headers in affected messages.

Microsoft Defender for Office 365-Configure trusted ARC sealers email authentication for Microsoft 365 Custom domains

Authenticated Received Chain (ARC) is a mechanism used in email authentication protocols to address the issues of message forwarding and intermediary handling of emails. It is designed to improve the reliability and security of email authentication systems like SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail).

Microsoft Defender for Office 365 – Configure DMARC email authentication for Microsoft 365 Custom Domains

Domain-based Message Authentication, Reporting, and Conformance (DMARC) builds upon SPF and DKIM to give domain owners greater control over how recipient servers handle their email messages. With DMARC, domain owners can specify policies instructing recipient servers on how to handle emails that fail SPF or DKIM checks. DMARC also enables domain owners to receive reports on email authentication results, allowing them to monitor and improve their email security posture.

Microsoft Defender for Office 365 – Configure DKIM email authentication for Microsoft 365 Custom domains

DomainKeys Identified Mail (DKIM) allows email senders to sign their outgoing emails digitally using cryptographic signatures. These signatures are stored as DKIM records in the domain’s DNS settings. Recipients’ mail servers can then use these signatures to verify that the email content has not been tampered with and originated from an authorized sender.

Microsoft Defender for Office 365-Configure SPF email authentication for Microsoft 365 domains

Microsoft Defender for Office 365 is a cloud-based email filtering service that helps protect businesses against advanced threats such as phishing and malware in emails, links, and collaboration tools like Microsoft Teams, SharePoint, and OneDrive. Formerly known as Office 365 Advanced Threat Protection (ATP), Microsoft Defender for Office 365 provides several features to enhance the security posture of an organization’s email and collaboration environment.

Optimizing Resource Allocation in Hyper-V Clusters

Resource allocation is at the core of efficient Hyper-V cluster management, dictating virtualized workloads' performance, scalability, and resilience. However, imbalances in resource allocation, encompassing CPU, memory, and storage, can precipitate performance...

Storage Failures in Hyper-V Cluster Management

Within the intricate web of Hyper-V cluster management, storage serves as the lifeblood, facilitating the seamless operation of virtualized workloads. However, the spectre of storage failures looms large, encompassing various issues ranging from disk failures to...

Fix VBR 12.1.1 Backup Configuration Warning Failed to connect to Red Hat Virtualization plug-in…

This is a very interesting warning. I migrated many VBR servers, and it’s the first time I’ve encountered this warning.
The detailed warning message is below:
Warning Failed to connect to Red Hat Virtualization plug-in: Failed to login to platform service: The remote certificate is invalid according to the validation procedure.

Determining Original OS Install Date – S2D HCI AZHCI

Hey Checkyourlogs Fans, A client recently asked me if we could tell when a couple of S2D HCI Nodes were installed. We are in the process of upgrading and replacing them, but we were wondering about the original install date. This is easy to determine. You can open an...

How to Install Veeam Backup Enterprise Manager 12.1

Veeam Backup Enterprise Manager is a centralized management and reporting tool designed by Veeam Software for overseeing Veeam Backup & Replication deployments. It allows administrators to control and monitor their backup infrastructure through a web-based...

How to Install Veeam Backup and Replication 12.1

When you install Veeam Backup & Replication v12.1, the Veeam Backup & Replication console is automatically installed on the backup server. If you want to access Veeam Backup & Replication remotely, you can install the Veeam Backup & Replication console on a dedicated machine.

How to Upgrade Veeam Backup and Replication with Hardened Repository to v12.1

Veeam Backup & Replication 12.1 is the newer build of version 12, and the major new features and enhancements were added in Veeam Backup & Replication v12.1. e.g. Detect and identify cyber threats, Respond and recover faster from malware, Ensure security and compliance, Veeam App for ServiceNow, Backup of object storage, Veeam CDP enhancements, Veeam AI Assistant, etc.

Entra Verified ID

Why!? Talking about emerging technologies is tricky because you never know if you are "catching it early" or is it something with very limited shelf life as another solution comes along. I've found the decentralized approach to identity as a potential use case the...

How to fix Content Security Policy (CSP) Missing

The Content Security Policy provides a valuable safety net that protects your website from malicious cross-site scripting (XSS) attacks. A well configured policy will stop an attacker attempting to inject their code, or references to other malicious content, into your website. Without a Content Security Policy, it’s easy for website developers to make mistakes that allow an attacker to inject content that changes the way the website behaves.

How to Plan Failover virtual machine to Disaster Recover Site at Veeam Backup and Replication v12

Planned failover is the smooth manual switching from a primary VM to its replica with minor downtime. Planned failover is proper when you know primary VMs are planning to go offline, and you need to switch the workload from the original VMs to their replicas as soon as possible. For example, you can use planned failover to perform data center migration, maintenance, or software upgrades on primary VMs. You can also perform planned failover if you see signs of an impending disaster.

How to undo failover the virtual machine to Production Site at Veeam Backup and Replication v12

One method for completing failover is to use failover undo. When you undo failover, you return to the original VM from a VM replica. When a virtual machine replica is in the Failover state, Veeam Backup & Replication discards all changes made to the replica. This is because the Failover state is intended to be a temporary state used to restore the virtual machine to operation quickly in the event of a disaster.