Forum Replies Created
Sep 08, 2020 at 6:34 am in reply to: linux tools that can gather traffic data & analyse like Netflow? #652385
Best Closed-Source Linux Network Monitoring Tools:
1. SolarWinds NetFlow Traffic Analyzer
2. Paessler PRTG Network Monitor
3. Nagios Network Analyzer
4. Zenoss Cloud
Top Open-Source Linux Network Monitoring Tools:
5. Icinga 2
9. Pandora FMS
12. EventSentry Light
13. Observium Community
You can use these tools for references
There are a few steps you need to follow in order to protect a shared folder
Navigate to the folder on your computer’s shared drive that you want to password-protect.
Right-click on the folder. A small gray menu then appears.
Scroll to the bottom of the menu to the “Properties” tab.
Double-click on the “Properties” tab.
Navigate to the “Sharing” tab at the far right and click on it.
Navigate to the bottom of the “Sharing” tab and check the “Make this folder private” box.
Click on the “Apply” button at the bottom of the display.
Click “OK” at the bottom of the display. The folder is then set to the administrator’s password.
It is very essential to password protect shared folders for security reason
I hope these steps are understandable.Sep 07, 2020 at 7:27 am in reply to: Tutorial how to get Teams working with Microsoft Phone system PBX #652369
Good video very helpful in understanding Microsoft Teams
Also, you have tried to cover all the aspects right from the basics in just 25 minutes
Very helpful in understanding the Phone Management system in Teams.
That’s really great and easy to understand in a short span of time, will be very helpful for someone who wants to begin.
Great effort is taken to help the community, a must-watch video
Thanks and warm regards.
- This reply was modified 1 year ago by jack220296.
Virtual networking is based on physical computer networking principles, but its functions are mostly software-driven. In a virtual networking environment, each VM is assigned a software-based virtual Ethernet card with separate media access control (MAC) and IP addresses. The VMs communicate by addressing the specified IP address of each destination VM. Similarly, a virtual local area network(VLAN) is created through software-based virtual switches that provide network communication between all virtual and connected machines.
Virtual networking also may be implemented on VMs that are installed or deployed on network/Internet-enabled physical servers or PCs.
There are two primary advantages of moving or redirecting Windows known folders (Desktop, Documents, Pictures, Screenshots, and Camera Roll) to Microsoft OneDrive for the users in your domain:
Your users can continue using the folders they’re familiar with. They don’t have to change their daily work habits to save files to OneDrive.
Saving files to OneDrive backs up your users’ data in the cloud and gives them access to their files from any device.Known Folder Move workshop
This workshop provides guidance on how you can roll out OneDrive Known Folder Move:
Plan for common challenges
Requirements for each deployment option
Deploy using Active Directory and Group Policy objects, Microsoft Endpoint Configuration Manager, or Intune
Monitor device eligibility, known folder details, move status, and Group Policy object state
The workshop assumes that you’ve already set up core infrastructure (Active Directory, DNS, AD Connect, Microsoft Endpoint Configuration Manager) and doesn’t cover third-party tools or custom applications integration.
For these reasons, we recommend moving or redirecting known folders to OneDrive if you’re an enterprise or large organization.
I hope this helpful.
also find this useful, but keep in mind you’ll need some experience with Group Policy. For info about the end-user experience, see Protect your files by saving them to OneDrive.
Cloud computing has become a fundamental requirement for most organizations.
With this in mind, cloud computing is massively on the rise in the current day and age. In fact, 81 percent of companies with 1,000 employees or more have a multi-platform strategy. The number is to rise to more than 90 percent by 2024. Between 2018 and 2021, worldwide spending on public cloud services is to grow to 73 percent, from $160B to $277B.
Cloud computing has been around for so many years, and this sudden growth might surprise a lot of the industry players.
Cloud computing became a phenomenon in the early 2000s. However, due to the lack of awareness about the potential of technology, many brands hesitated to adopt it for their products and processes. Bart McDonough, CEO of Agio, believes the recent rapid adoption of cloud is mainly due to the understanding of “ease of use and scalability” of the technology.
As organizations expand their understanding of the enormous benefits of cloud computing, they are now more willing to conduct workload tests on the cloud and even migrate entire applications to the cloud.
But as far as the future is concerned I would recommend https://www.apps4rent.com/
As they provide quality services and also have received good word of mouth from my peers about it
Even I have been using Chrome since ages however some of the emerging browsers which can replace chrome include
I have been an iPhone user for more than 5 years I believe Safari is More UserFriendly
Although there are people with different opinions
I hope my suggestion helps.
- This reply was modified 1 year ago by jack220296.
DNS namespace: DNS is the name service provided by the Internet for TCP/IP networks. DNS is broken up into domains, a logical organization of computers that exist in a larger network. The domains exist at different levels and connect in a hierarchy that resembles the root structure of a tree. Each domain extends from the node above it, beginning at the top with the root-level domain. Under the root-level domain are the top-level domains, under those are the second-level domains, and on down into subdomains. DNS namespace identifies the structure of the domains that combine to form a complete domain name. For example, in the domain name sub.secondary.com, “com” is the top-level domain, “secondary” identifies the secondary domain name (commonly a site hosted by an organization and/or business), and “sub” identifies a subdomain within the larger network. This entire DNS domain structure is called the DNS namespace. The name assigned to a domain or computer relates to its position in the namespace.
The Following process needs to be followed in order to migrate to AZURE
Prepare to use Azure with Azure Migrate:Server Migration.
Check requirements for machines you want to migrate, and prepare a machine for the Azure Migrate replication appliance that’s used to discover and migrate machines to Azure.
Add the Azure Migrate Server Migration tool in the Azure Migrate hub.
Set up the replication appliance.
Install the Mobility service on machines you want to migrate.
Run a test migration to make sure everything’s working as expected.
Run a full migration to Azure. Prepare Azure
Prepare Azure for migration with Server Migration.
Create an Azure Migrate project Your Azure account needs Contributor or Owner permissions to create a project.
Verify permissions for your Azure account Your Azure account needs permissions to create a VM, and write to an Azure managed disk.
Assign permissions to create a project
In the Azure portal, open the subscription, and select Access control (IAM).
In Check access, find the relevant account, and click it to view permissions.
You should have Contributor or Owner permissions.
If you just created a free Azure account, you’re the owner of your subscription.
If you’re not the subscription owner, work with the owner to assign the role.
Assign Azure account permissions
Assign the Virtual Machine Contributor role to the Azure account. This provides permissions to:
Create a VM in the selected resource group.
Create a VM in the selected virtual network.
Write to an Azure managed disk.
Create an Azure network
Set up an Azure virtual network (VNet). When you replicate to Azure, Azure VMs are created and joined to the Azure VNet that you specify when you set up migration.
Prepare for migration
To prepare for physical server migration, you need to verify the physical server settings, and prepare to deploy a replication appliance.
Check machine requirements for migration
Make sure machines comply with requirements for migration to Azure.
When migrating physical machines, Azure Migrate:Server Migration uses the same replication architecture as agent-based disaster recovery in the Azure Site Recovery service, and some components share the same code base. Some content might link to Site Recovery documentation.
Verify physical server requirements.
Verify that on-premises machines that you replicate to Azure comply with Azure VM requirements.
There are some changes needed on VMs before you migrate them to Azure.
For some operating systems, Azure Migrate makes these changes automatically.
It’s important to make these changes before you begin the migration. If you migrate the VM before you make the change, the VM might not boot up in Azure. Review Windows and Linux changes you need to make.
Prepare a machine for the replication appliance
Azure Migrate: Server Migration uses a replication appliance to replicate machines to Azure. The replication appliance runs the following components.
Configuration server: The configuration server coordinates communications between on-premises and Azure, and manages data replication.
Process server: The process server acts as a replication gateway. It receives replication data; optimizes it with caching, compression, and encryption, and sends it to a cache storage account in Azure.
Prepare for appliance deployment as follows:
You prepare a machine to host the replication appliance. Review the machine requirements.
The replication appliance uses MySQL. Review the options for installing MySQL on the appliance.
Review the Azure URLs required for the replication appliance to access public and government clouds.
Review [port] (migrate-replication-appliance.md#port-access) access requirements for the replication appliance.
The replication appliance shouldn’t be installed on a source machine that you want to replicate or on the Azure Migrate discovery and assessment appliance you may have installed before.
Add the Server Migration tool
Set up an Azure Migrate project, and then add the Server Migration tool to it.
In the Azure portal > All services, search for Azure Migrate.
Under Services, select Azure Migrate.
In Overview, click Assess and migrate servers.
Under Discover, assess and migrate servers, click Assess and migrate servers.
In Discover, assess and migrate servers, click Add tools.
In the Migrate project, select your Azure subscription, and create a resource group if you don’t have one.
In Project Details, specify the project name, and geography in which you want to create the project, and click Next. Review supported geographies for public and government clouds.
In the Select assessment tool, select Skip adding an assessment tool, for now,> Next.
In Select migration tool, select Azure Migrate: Server Migration > Next.
In Review + add tools, review the settings, and click Add tools
After adding the tool, it appears in the Azure Migrate project > Servers > Migration tools.
I know this process is a bit tough to understand but there are some youtube tutorial videos which you can checkout
I Personally think that IT certification is not worth it, as you have to spend a huge amount on it. Having a degree from a Good Institution providing placement assistance is the best thing you can do. However, If you do not have an IT degree and you belong to some other background and you want to learn more and start a career in IT Then you can search for some courses depending on your budget
Few IT Courses I know include
AWS Certified Solution Architect
Project Management Professional
Google Certified Professional Cloud Architect
Hope this post has helped to clear your confusionSep 04, 2020 at 6:00 am in reply to: How to Migrate Exchange to Office 365 (Microsoft 365) Mailboxes? #652319
The following steps should be used for migration
1.Verify you own the domain
2.Connect Microsoft 365 or Office 365 to your email system
3.Create the cutover migration batch
4. Start the cutover migration batch
5.Route your email directly to Microsoft 365 or Office 365
6.Delete the cutover migration batch
7.Assign licenses to Microsoft 365 and Office 365 users
Complete post-migration tasks
These are steps you need to follow to migrate exchange to OFFICE 365
The steps to Apply DLP in office 365 Include
To create a DLP policy, first log into the Office or Microsoft 365 tenant, select Admin centers and then choose Security & Compliance
1.Once the Security & Compliance center is loaded, expand the Data loss prevention menu, and choose the Policy menu item.
2. Select the Create a policy button. A wizard interface will load from the right side, where you can set the properties needed for the policy. Choose the industry regulation category, which will display regional and country-specific regulations.
3. Clicking the Financial option will display country-specific policies that you can use
4. Clicking a regulation will display a short description and the information it protects.
5. Once selected, click the next button and type the name and description for the policy, then press next. Not every location warrants a policy. You either select “All locations” or pick the locations that you want the policy to apply. You can decide between Exchange email, SharePoint sites, and OneDrive accounts. For SharePoint and OneDrive sites, you can choose sites or accounts as well as exclude some as needed
6. Once you have defined the locations, press the next button. Now you can either choose the simple or advanced option. Simple settings make it easy to create the most types of DLP policies without creating rules. Advanced settings use the rule editor to give you control over every setting of your policy. The simple setting option covers the most common scenarios.
Even with the simple option, you still need to choose the detection type for the policy you are creating
7.Once you choose whether to inspect external or internal content, press the next button. You will need to define policy tips for the end-users. Then, you can set an alert for the number of times a sensitive information type is shared with the same content. Finally, chose whether or not to block people from sharing and restrict access to the content.
8.You can turn the rule on right away, test it, and show or hide policy tips, or simply not enable it at all.