Sample Incident Response Plan for a Cyber Ransomware Attack
Cybersecurity threats such as ransomware attacks have become more frequent and sophisticated, and...
Read MoreSelect Page
Mar 8, 2023 | Cyber Security | 0 |
Cybersecurity threats such as ransomware attacks have become more frequent and sophisticated, and...
Read MoreMar 8, 2023 | Hyper-V, Windows Server | 0 |
There are many ways to rebuild the Hyper-V host, but I will show you how to rebuild a Microsoft Hyper-V host via Virtual Media. These screens captured were for Windows Server 2019, but not for Windows Server 2019 only. You can use Windows Server 2022 ISO image file too.
Read MoreMar 7, 2023 | Cyber Security, Veeam | 0 |
Vulnerability in this Veeam Backup & Replication component allows unauthorized users to obtain encrypted credentials stored in the configuration database. The vulnerability may lead to these unauthorized users gaining access to backup infrastructure hosts. The vulnerable process Veeam.Backup.Service.exe (TCP 9401 by default) allows unauthenticated users to request encrypted credentials.
Veeam released new patches to fix this vulnerability on March 7, 2023. No Hosts restart is required after installing this patch.
Mar 7, 2023 | Cyber Security | 0 |
Cyber attacks are on the rise today, and no organization is immune to them. DIVECORP, a global...
Read MoreVulnerability in this Veeam Backup & Replication component allows unauthorized users to obtain encrypted credentials stored in the configuration database. The vulnerability may lead to these unauthorized users gaining access to backup infrastructure hosts. The vulnerable process Veeam.Backup.Service.exe (TCP 9401 by default) allows unauthenticated users to request encrypted credentials.
Veeam releases new patches to fix this vulnerability. No Hosts restart is required after installing this patch.
Mar 7, 2023 | Cyber Security, Veeam | 0 |
Veeam release the patches to fix the Vulnerability in this Veeam Backup & Replication component and send an email to customers, but they are using the wrong KB# for v11a (or not update the KB),
Read MoreMar 6, 2023 | Cyber Security | 0 |
DIVECORP, a global company with offices in Florida, Bali, and Mexico, experienced a severe...
Read MoreMar 6, 2023 | Hyper-V, Windows Server | 0 |
There are many ways to rebuild the Hyper-V host, but I will show you how to rebuild a Microsoft Hyper-V host via Virtual Media Wizard. This process is also can use for other vendors’ machines, not for the dataOn host only.
Read MoreMar 6, 2023 | Windows Server | 0 |
Active Directory (AD) delegation is essential for managing permissions and access to AD resources....
Read MoreMar 5, 2023 | Cyber Security | 0 |
In the world of cyber security, one of the most important things an organization can do is have a...
Read MoreMar 5, 2023 | Azure, Windows Server | 0 |
Azure Backup is a powerful tool that can protect and recover data for Azure Virtual Desktop (AVD)...
Read MoreMar 5, 2023 | Hyper-V, Windows Server | 0 |
There are many ways to rebuild the Hyper-V host, but I will show you how to rebuild a Microsoft Hyper-V host via PXE. This process is also can use for other vendors, not for the DataOn host only. It would be best to ask the host hardware vendor to send you the custom WIM image file before rebuilding it.
Read MoreMar 4, 2023 | Cyber Security | 0 |
As we look ahead to 2023, it’s clear that cyber security and ransomware attacks will...
Read MoreIf you are trying to rebuild the Azure AD Connect server, but you noticed y the Delete user is greyed out and you cannot delete the existing On-Premises Directory Synchronization Service Account from Microsoft 365 admin center.
Read MoreMar 3, 2023 | Azure, Windows Server | 0 |
If you run an Azure environment, you may occasionally encounter issues with virtual machines that...
Read MoreMar 3, 2023 | Azure, Cyber Security | 0 |
In today’s digital age, protecting your organization’s data and assets from cyber...
Read MoreMar 2, 2023 | Windows Server | 0 |
In a secured environment, creating and deploying images for systems can be a challenge due to...
Read MoreMar 2, 2023 | Cyber Security | 0 |
As we move into 2023, the threat landscape is more complex than ever. With cyberattacks becoming...
Read MoreKMS (Key Management Service) activation is essential to activate Windows operating systems in an...
Read MoreThe License Overview reports show statistical information on how many licenses are used and by which organization.
Read MoreMar 1, 2023 | Cyber Security | 0 |
Organizations must stay aware of potential cyber threats as we approach the new year and take the...
Read MoreThe Storage Consumption reports show statistical information on used space in backup or object storage repositories, including archive object storage.
Read MoreFeb 28, 2023 | Cyber Security | 0 |
As the world increasingly digitizes, businesses leverage cloud-based platforms for data storage,...
Read MoreFeb 28, 2023 | Windows Server | 0 |
Configuring reporting for DataON S2D running Server 2022 is essential to monitor server...
Read MoreThe Mailbox Protection reports show statistical information on protected and unprotected mailboxes of your Microsoft 365 and on-premises Microsoft Exchange organizations.
Read More