Categories
Palo Alto Security VoIP

3CX Phone System on a Raspberry Pi 4: Palo Alto Firewall Settings (Part 3)

In this final segment, I’m going to share my firewall settings that allow my #3CX system to function for both internal phones and external mobile users. This has been enjoyable discovering since I wasn’t able to find any other 3CX users using a Palo Alto firewall (probably because if they are using a Palo Alto, […]

Categories
Hardware Palo Alto Security

So I Wanted a New Firewall…

If you have ever spent much time working with the Ubiquity UDM Pro, you will find that it is a great device for many things (network controller, video and phone controller, etc.). However, it’s not the best firewall if you are going to do some advanced rulesets or want to have that extra peace of […]

Categories
Security

Apache Log4j Critical Vulnerability

On 9 December, 2021, a Proof-of-Concept (PoC) exploit was published highlighting a Remote Code Execution (RCE) critical vulnerability in the Apache Log4j library. Log4j is a popular Java library that can be found in many applications and services found throughout the Internet. Some of the more popular products that leverage this are: Minecraft: Java Edition […]

Categories
Security Windows 10 Windows 11

Security Advisory: Update PowerShell 7

Microsoft is advising system admins to update any systems that have PowerShell 7.0 or 7.1 installed due to another vulnerability that has been identified. Details on what the issues are can be found here and here. Versions 7.0.8 and 7.1.5 were released this past week that fix the two vulnerabilities. Here is the downside: The […]

Categories
Ansible Linux Security

Update Debian/Ubuntu with Ansible

So we all know the pain that is keeping multiple systems patched and updated throughout the month. If you have the *pleasure* of having to do that manually, then I may have a possible solution for you. Ansible is an Open Source project overseen by RedHat and the basic tooling is available for free. Originally […]

Categories
Security Windows 10

Native OpenSSH Client in PowerShell

So one of the nice little surprises after upgrading my desktop to Windows 10 20H2 (Fall 2020 Build) was the addition of a native OpenSSH client in PowerShell. I need to do some testing with all of my use cases, but I may be able to do away with the venerable PuTTY that has been […]

Categories
Linux Security

Add RHEL 8 server to Active Directory

So there I was looking for which accounts I created on my test VMs. Because, of course, I didn’t use the same account name on all of the test clients. That would have made too much sense. With some of the changes to Windows 10 20H2 that I’ll talk about in another posting, I thought […]

Categories
Horizon Security

SAML Authentication with Workspace ONE Access: Part 4 SSL Configuration

This is the 4th part of my multi-part series on setting up SAML Authentication using the VMware Workspace ONE Access product. In this article, I will quickly cover the Secure Sockets Layer (or SSL) configuration I will be using. If you missed my earlier posts, you can review them here: Part 1: Preparation Part 1.5: […]

Categories
Security VMware

PowerShell Script to Apply DISA STIG to a VMware Virtual Machine

Most organizations have security compliance requirements for their servers. My past organization was no different. We had to meet Security Technical Implementation Guide (STIG) standards published by the Defense Information Systems Agency (DISA). They have hundreds of configuration guides for various Operating Systems and Applications. These guides are a great starting point if you are […]

Categories
Security

How to Verify Authenticity of Your Software Downloads

Happy New Year! I hope you are all enjoying the start to, hopefully, a wonderful year. I thought I’d start my first real “content” piece with something that isn’t really about virtualization, but incredibly important for anyone: How do you ensure that software or file you downloaded is authentic and not Malware/Ransomware? There have been […]

%d bloggers like this: