Even after the user regains access to their account, the attacker might have left back-door entries that allow the attacker to resume control of the account. Do all of the following steps to regain control of the account. Go through the steps as soon as you suspect a problem and as quickly as possible to make sure Read More
Month: July 2023
How to Search Audit Log in the Microsoft Purview Compliance Portal
Need to find if a user viewed a specific document or purged an item from their mailbox? If so, you can use the audit log search tool in the Microsoft Purview compliance portal to search the unified audit log to view user and administrator activity in your organization. Thousands of user and admin operations performed Read More
How to Disable Weak Cipher Suites in IIS
By default, IIS is installed with 2 weak SSL 2.0 cipher suites that are enabled: SSL2_RC4_128_WITH_MD5 and SSL2_DES_192_EDE3_CBC_WITH_MD5. This can impact the security of AppScan Enterprise, and the cipher suites should be disabled. Before you begin Incorrectly editing the registry may severely damage your system. Before making changes to the registry, you should back up any valued data Read More
How to Remove the .NET Runtime and SDK
Over time, as you install updated versions of the .NET runtime and SDK, you may want to remove outdated versions of .NET from your machine. Uninstalling older versions of the runtime may change the runtime chosen to run shared framework applications, as detailed in the article on .NET version selection. Should I remove a version? The .NET Read More
How to Setup Health Check Ping for a Kubernetes Server
Health Check Ping Server When using Let’s Encrypt on some Kubernetes clusters, health checks can fail for the SCIM bridge before the bridge is able to obtain a Let’s Encrypt certificate. Set OP_PING_SERVER to 1 to enable a /ping endpoint on port 80 so that health checks will always be brought online: kubectl set env deploy/op-scim-bridge OP_PING_SERVER=1
How to Install Webex with Microsoft Intune
Webex supports integration with Enterprise Mobility Management (EMM) such as Microsoft Intune, a cloud-based service that provides both Mobile Application Management (MAM) and Mobile Device Management (MDM) capabilities. MAM software allows you to provision, configure and control access to mobile applications deployed in your organization. MDM software allows administrators to monitor, manage and secure corporate Read More