sample csv file

How to Secure and Restore a Compromised Microsoft 365 Mailbox

Even after the user regains access to their account, the attacker might have left back-door entries that allow the attacker to resume control of the account. Do all of the following steps to regain control of the account. Go through the steps as soon as you suspect a problem and as quickly as possible to make sure Read More

sample csv file

How to Disable Weak Cipher Suites in IIS

By default, IIS is installed with 2 weak SSL 2.0 cipher suites that are enabled: SSL2_RC4_128_WITH_MD5 and SSL2_DES_192_EDE3_CBC_WITH_MD5. This can impact the security of AppScan Enterprise, and the cipher suites should be disabled. Before you begin Incorrectly editing the registry may severely damage your system. Before making changes to the registry, you should back up any valued data Read More

sample csv file

How to Remove the .NET Runtime and SDK

Over time, as you install updated versions of the .NET runtime and SDK, you may want to remove outdated versions of .NET from your machine. Uninstalling older versions of the runtime may change the runtime chosen to run shared framework applications, as detailed in the article on .NET version selection. Should I remove a version? The .NET Read More

sample csv file

How to Setup Health Check Ping for a Kubernetes Server

Health Check Ping Server When using Let’s Encrypt on some Kubernetes clusters, health checks can fail for the SCIM bridge before the bridge is able to obtain a Let’s Encrypt certificate. Set OP_PING_SERVER to 1 to enable a /ping endpoint on port 80 so that health checks will always be brought online: kubectl set env deploy/op-scim-bridge OP_PING_SERVER=1

sample csv file

How to Install Webex with Microsoft Intune

Webex supports integration with Enterprise Mobility Management (EMM) such as Microsoft Intune, a cloud-based service that provides both Mobile Application Management (MAM) and Mobile Device Management (MDM) capabilities. MAM software allows you to provision, configure and control access to mobile applications deployed in your organization. MDM software allows administrators to monitor, manage and secure corporate Read More