Tuesday, August 22, 2023



Monitor ESET Antivirus Administrative console


Log in to : https://xxxxxx

User name: administrator Password is: xxxxxx

Under Antivirus Detections tab, monitor Daily summary of detection events in last 30 days





To get details about virus click on number and " show Detailed information" windows will appear











New window will open with detection details





Saturday, August 5, 2023

Professional level of protection, even when the services you use could be breached. ( Golden Rule )

 Hey there,


I couldn't help but notice that Twitter has been in the spotlight once again due to a security breach. This time, around 235 million users' email addresses, phone numbers, and Twitter handles were exposed. This situation got me thinking about the steps you should take to protect your anonymity online, especially when the services you use could potentially be compromised. 


The golden rule to remember is: if you want to stay anonymous online, don't provide enough information to a single service that could jeopardize your anonymity should a breach occur. That means, don't give out a phone number or email address that can be traced back to you. If a service requires a phone number to set up your account, opt for an online service that provides a temporary, disposable number. Once your account is set up, ensure you establish real 2FA (like a security key or TOTP), and remember to generate and save recovery codes. After doing this, you can remove the phone number.


When it comes to your email address, create a new one and use it exclusively for signing up for the service. Never send any emails from it and don't give it out to anyone. By following these steps, a single service breach won't compromise your anonymity.


However, if staying anonymous is very important to you, then these measures might not be sufficient. Below are some additional steps you can take to ensure your online security:


1. Don't use the same anonymous email account for multiple services. Instead, create a separate email account for each service. This way, breaches at multiple services won't allow anyone to correlate your identities across them.


2. Avoid configuring the email account to forward emails to your real address. Doing this could link your anonymous email account to your real address if the email service provider is breached.


3. Avoid logging into the temporary phone number service or the anonymous email account from an IP address that can be traced back to you. Use a reputable VPN with privacy guarantees, so that the IP address your logins come from is shared by many other people and can't be traced back to you. 


4. Be careful when logging in to the temporary phone number service or the anonymous email account over a public wifi network, as it could potentially compromise your anonymity.


5. Try to only log into the service you're trying to remain anonymous on from public wifi.


Use an ad/tracker blocker in your browser on your computer and phone. uBlock  and Blokada are good choices.


Remember, protecting your identity is crucial in this digital age. Stay safe online!


Best,


Alex




Wednesday, July 26, 2023

Suppression rules may be edited to unintentionally suppress more alerts in the Microsoft Defender 365 portal

 User impact: Suppression rules may be edited to unintentionally suppress more alerts in the Microsoft Defender 365 portal.

  Current status: We've determined that a code regression is inadvertently causing edited suppression rules to unintentionally suppress more alerts in the Microsoft Defender 365 portal. In an attempt to prevent further impact, we've introduced validation logic which will prevent users from saving invalid rules which we suspect is causing impact. To further mitigate impact, we're working on a fix to address existing impact from rules already created that have suppressed other alerts. Scope of impact: Impact is specific to users who are served through the affected infrastructure. Root cause: A code regression is inadvertently causing edited suppression rules to unintentionally suppress more alerts in the Microsoft Defender 365 portal.


Tuesday, July 11, 2023

Golden rule - 12

 RTFM

Read documentation to the end before you do. Take a deep breath, grab a cup of coffee (or your preferred beverage), and dive into that documentation like a fearless adventurer. Trust me, it'll save you a ton of time and frustration in the long run.


. 😊



Friday, July 7, 2023

How To Use Check Fish Scanner -An AI-powered scanner that analyzes the safety of URLs right from your inbox.

 

How To Use Check Fish Scanner

CheckPhish Scanner for Outlook is an AI-powered scanner that analyzes the safety of URLs right from your inbox.

Find your add-in under Home tab > Get Add-ins > Admin-managed > CheckPhish Scanner for Outlook

Right now it is implemented in few computers, once it will be implementen in all Teams Transport organization, you will receive email ( please see picture)

Once Check Phish Scanner plug in implemented in your cmpuer ( it will be unatendet implementation) you need manualy click on fish icon, to scan suspecious email.

Scan done per one email that you choose to scan, in your mailbox. It wont work in shared mailboxes.








Friday, June 2, 2023

5-minute wait when you power cycle Fiber Optic router

Apparently, there are fiber optic routers out there that require a 5-minute wait when you powercycle them.  Crazy, right? Always something new to discover in the world of technology.

Thursday, June 1, 2023

"Hard match" for ADConnect

 

 

 

 

 

"Hard match" for ADConnect

 

 

On user properties  go down and find On-premises immutable ID (in this case is

QOqq1+9+7ESYAJc+xpRKAA==) of account that will be deleted.




 


Then collect Object ID from user that will stay


 

Pause synchronization by opening  Azure AD connect application

Delete 2 times user duplicate ( with no files attached)

Verify msds consistansy is not empty

 







 

If it empty  use object Duig to paste it to ms ds


 



 

 

Make sure user deleted twice ( from deleted users as well)

In case its not installed ( not Active directory teamstransport case)

install-module azuread

install-module msonline

 

 

 

Run only if session ended  ( computer restarted)

connect-azuread


 

connect-msolservice

 


 Set-AzureADUser -objectID XXXXXXX -ImmutableId XXXXXXX

Object ID its “good user” , and Immutebleld ID its from deleted user, replace and run sync

 

 

 

Set-AzureADUser -objectID 6215c50a-242a-4723-89aa-xxxxxxxxxxxx -ImmutableId LBWfMzBWxxxxxxxxxfaWSILpw==

 

 

Start-ADSyncSyncCycle Delta

Run Synchronization Service Manage  to monitor synchronization




Ninite.com - download commonly installed programs all at once when setting up a new computer.

 Ninite.com is a free and user-friendly service that simplifies the process of installing and updating commonly used software on Windows com...