image-1

How to Fix “Incomplete Certificate Chains” on Palo Alto Firewalls

Find websites that cause incomplete certificate chain errors. Filter the Decryption log to identify Decryption sessions that failed because of an incomplete certificate chain.In the filter field, type the query (err_index eq Certificate) and (error contains ‘http’). This query filters the logs for Certificate errors that contain the string “http”, which finds all of the error Read More

image-1

How to Assign the Windows Company Portal Via Intune To manage devices and install apps, your users can optionally use the Company Portal app. You can assign the Windows Company Portal app directly from Intune using Microsoft Store app (new) apps. Prerequisites You can choose to install the Company Portal app using the steps below. The Company Portal app Read More

image-1

How to Redirect a Subdomain to a URL with Cloudflare

For anyone looking to Forward a Subdomain to a URL these are the steps I used as of October 2023. In the example below I will Forward sub.doamin.com to https://google.com *Note: verify Cloudflare is not paused on your domain. (Overview page, lower right under “Advanced Actions”) Step1 – Create DNS RecordType: CNAMEName: subTarget: domain.comProxy status: ProxiedTTL: Auto Step2 – Create Redirect RuleUnder Read More

image-1

How to Add Web Apps to Microsoft Intune

Intune supports a variety of app types, including web apps. A web app is a client-server application. The server provides the web app, which includes the UI, content, and functionality. Additionally, modern web-hosting platforms commonly offer security, load balancing, and other benefits. A web app is separately maintained on the web. You use Microsoft Intune Read More

image-1

How to Fix Microsoft IIS Tilde Character Short File/Folder Name Disclosure

Description Microsoft Internet Information Server (IIS) suffers from a vulnerability which allows the detection of short names of files and directories which have en equivalent in the 8.3 version of the file naming scheme. By crafting specific requests containing the tilde ‘~‘ character, an attacker could leverage this vulnerability to find files or directories that Read More

image-1

How to Uninstall Software Using PowerShell

Most of us have uninstalled programs from our PCs. How have you done it? Can you recollect? We’ve done it mostly using the Control Panel or in some cases, if dealing with more complex suites, their own uninstall process.  These options are convenient to remove a single program, they’re not scalable. Imagine for a moment Read More