Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x

Security

24K

Solutions

24K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.

Share tech news, updates, or what's on your mind.

Sign up to Post

i received large spam mail om my leased line and checked my exchange 2013 and my two mailbox and Symantec exchange mail security  7.5.6 are updated and good
I opened Anti spam in fortiGate and blocked many ip but not all.
i need solution for my situation.
0
Become an Android App Developer
LVL 11
Become an Android App Developer

Ready to kick start your career in 2018? Learn how to build an Android app in January’s Course of the Month and open the door to new opportunities.

Please provide me with guides on implementing Bit Locker encryption within Windows 10 and integrating the Bit Locker encryption recovery keys within Active Directory.
0
What is the proper process for creating Active Directory accounts that will only be used to run services such as Symantec Backup Exec without granting any additional or too many rights to these AD accounts (such as not allowing these AD accounts to logon locally or using Remote Desktop) within Server 2016?
0
What is this /?&s= when it is appended to a seemingly legitimate website, but followed by a very long number?

/?&s=

Open in new window

0
How do I find install security patches via cli ? and also remove that patch if necessary?
For an example, i want to find whether i installed ESXI650-201712101-SG
0
I have a medium sized network and I just updated my trend micro worry free business security server with the latest patches that are supposed to support windows 10 and stuff. Shortly after installing these patches and rebooting my server which is server 2012 standard, it froze up. Rebooted several times before it appeared to be working fine again.
I then went home happy....well I get a call and now all the workstations are experiencing the same issue.  I'm here now working on them. Some are fine and have the new trend updates and some are freezing shortly after boot. Even after a hard reboot if I can get into the admin profile, there aren't even any error messages in the event viewer stating there was a hard reboot.

We also have malwarebytes running all the machines. There are a few windows updates that are pending on a few machines but I don't think that would effect my antivirus updates. I'm rebooting over and over and having some success but it's slow. What else can I try?
1
Hello,

I've read a few articles but am looking for the best practice or best solution to block non company phones from our exchange server (2012). We utilize android devices, and only want approved devices to access email (no iphone, ipad, etc). Is there a good way to do this using just exchange? We are looking into Airwatch as an mdm as well.

Thank You for your time.
0
We are setting up a new domain, designated for a critical sensitive applications with its own AD/DC.

Is it Ok for the AD/DC servers to sit in same subnet as the apps servers    Or
should we segregate into separate subnets?

If separate subnets, segregate by router ACL is enough or firewall?

What's the reason & the best practices out there?
0
Just wondering if anyone knows if there is a application and/or software that is available out in the market that can view all the different types of video cameras from vendors such as Cameleon, Enudra (Pelco), Exacqvision for example. There are others as well.

Probably just a generic software/application or something that is compatible with most vendors.

Thanks in advance,
Paula
0
I am getting a exception when trying to deploy it on 12.2.1,


<WebLogicServer> <BEA-000360> <The server started in RUNNING mode.>
     [java] WLST-WLS-1516225291084: <Jan 17, 2018, 3:41:43,107 PM CST> <Notice>  <WebLogicServer> <BEA-000365> <Server state changed to RUNNING.>
     [java] Server started successfully.
     [java] Connecting to t3://127.0.0.1:7001 with userid wlsboot ...
     [java] WLST-WLS-1516225291084: <Jan 17, 2018, 3:41:45,493 PM CST> <Warning> <JMX> <BEA-149535> <JMX Resiliency Activity Server=admin7001 : Initializing callbacks>
     [java] WLST-WLS-1516225291084: <Jan 17, 2018, 3:41:45,493 PM CST> <Warning> <JMX> <BEA-149535> <JMX Resiliency Activity Server=admin7001 : Added MBeanServerConnection in DomainRuntimeServiceMBean >
     [java] WLST-WLS-1516225291084: <Jan 17, 2018, 3:41:45,509 PM CST> <Warning> <JMX> <BEA-149535> <JMX Resiliency Activity Server=admin7001 : Callback is done>
     [java] WLST-WLS-1516225291084: <Jan 17, 2018, 3:41:45,509 PM CST> <Warning> <JMX> <BEA-149535> <JMX Resiliency Activity Server=admin7001 : Connection already exists for the server. Did not attempt to connect to the server>
     [java] Successfully connected to Admin Server "admin7001" that belongs to domain "erm7001".
     [java]
     [java] Warning: An insecure protocol was used to connect to the server.
     [java] To ensure on-the-wire security, the SSL port or Admin port should be used instead.
     [java]
     [java] Location changed to edit …
0
Concerto Cloud for Software Providers & ISVs
LVL 5
Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

I am about to distribute SCEP to users who are not being managed by our SCCM infra, but we need to provide them antimalware software. One thing I noticed is as soon as I install SCEP on a machine, All settings are grayed out so users can change the settings.
On settings page of SCEP, it says 'For your protection, some settings are managed by your security administrator"

How can I unlock the settings so that users can have full control to the settings or is it how SCEP work, supposed to be managed by SCCM?
0
Hey

I would like to create:

C:\MyFolder

SecurityGroup A = Rights to delete the hole folder
SecurityGroup B = Unable to delete C:\MyFolder - but able to delete all content under C:\MyFolder - Write/Read all files - Create/delete folders - no access to rights/take ownership

Thanks in advance

Mike
0
Due to security reason I dont want internet access in my domain controllers, I need help to know the best practices to disable internet in Domain Controllers.
0
I am putting together some phone equipment and servers in a datacenter cabinet.  The datacenter is providing us a redundant router connection using HSRP.  The cabinet has two Ethernet cables: primary, secondary.

We need external routable addresses for each of the two border controllers for the phone system.  They have a WAN port and a LAN port so they can have an external (outside the firewall) connection and also have a local IP address in the same subnet as the servers in the cabinet.

We are trying not to purchase another $2000 Cisco switch for the setup to accept the 2 Ethernet connections.

We have a WatchGuard M370 firewall device with several ports that can be configured in many ways.

We have two layer 2 switches available in the cabinet for use outside and/or inside the firewall. It is a layer 3 device.

I need help in the configuration of this system.

One suggestion was to take the two datacenter network cables and plug them into a standard Layer 2 switch then patch that switch into an external interface on the firewall.  After so many attempts I am trying to remember but I think the path to the internet was broken when BOTH router cables were plugged into that switch.  I am going back to the datacenter tomorrow to try more things but I wanted to get some input from you guys first.  I have the datacenter IP sheet where they provide me the configuration info but didn't want to post live addresses on this site.  Basically they gave me a \29 subnet and …
0
One of the Experts here on EE suggested GFI Languard.  So, we bought it and have  had it running for a few months.  As I get further into it and want to take advantage of its capabilities, I naturally have questions.

Being a "good customer" I figured to start on the community forum.  But I can't log in and I can't set up a new account.  I have LOTS of email addresses available and can set up new ones.  Yet, no matter which one I enter for a new Registration, it says "already used".  Can't be true of course.

Telephone customer support takes one to a menu that has nothing to do with customer support and, if you politely wait after not responding, it says "Goodbye".

I may be in the market for 3rd party Q&A at least.  Or, what might you suggest?
0
Hello,

For security reasons, users must query a replica database that is updated by an intermediate replica.
We must ensure performance and that requests do not impact replication. How to proceed ?

Thank you

Regards
0
Watchguard mobile VPN stops receiving data whenever I reboot my laptop. It requires me to uninstall and install again to make it working. Can some please suggest me the cause of the issue.
1
Hello,

I have been infected by some ransonware i don`t know.

In the attached file is the readme file with the instructions to decrypt the files. Anyone knows the ransomware and how to decrypt it?

It seems a xorist one, but the tool by kaspersky doesn`t work.

Any information will be welcomed.
README_9670338_05489.txt
0
Hi there, we have started using Meraki devices. While we are very happy with the switching and the wireless solution we are struggling a little with the firewall part of the solution.
Among the many problems we are facing there is one which is more urgent than the others, the Active Directory integration with group policy.

I have successfully followed the documentation found here:
https://documentation.meraki.com/MX-Z/Group_Policies_and_Blacklisting/Integrating_Active_Directory_with_Group_Policies#Create_LDAP_Group_to_Group_Policy_Mappings_in_Dashboard

The AD servers have been added, I've got a green tick on the status and I'm able to query LDAP getting the required security groups to be added to the policies (See AD Authentication Screenshot).

What I have done is putting one AD user in a specific Security Group in AD and build a single rule to block a website and it doesn't work, also on the policy list I cannot see any client added (see Policy Screenshot)
If I manually assign the client to a policy (selecting the clients from Network-wide - > Clients) it works.
This make me think that despite I have followed the documentation and the diagnostic page for AD integration says green light, the AD based authentication is the problem. Also, I don't use the splash screen to authenticate the users, I don't know if it is a requirements but I'm not willing to use any splash screen.

Can someone help me?  


Thanks
-Daniele
ad-auth.png
Policy.png
0
What does it mean to be "Always On"?
LVL 5
What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

I have an application which has a token set to officially expire after 30 minutes. If inactive at the 20- minute mark, it looks back 5 minutes for activity. If none exists, it kills the session. The majority of the users do work in the first 10 minutes and usually tend to other tasks. They are frustrated with our settings and are asking us to check back farther than 5 minutes and the 20-minute mark.

What makes sense to do here in accordance with best practice?
0
Looking into implementing Windows Hello for Business but have some concerns as admin.

How will this work with shared admin accounts?

How will this work If we use an iDP (Saml) + OTP for our cloud apps (G Suite, Box,etc?

We use Citrix>iDP>RDP to connect to users PC. How will Hello work in this setup?
0
After a security review of our new WordPress site it was pointed out that we're vulnerable to "External Service Redirecton - DNS". Specifically, if a URL is entered into the "Your Name" field of our Contact 7 Form then the testers have found that: "It was possible to induce the application to perform server-side DNS lookups of arbitrary domain names"

The suggested remedial action is to implement a whitelist of permitted services and hosts and to block interaction not on this whitelist.

I'm something of a newbie when it comes to this, and it occured to me (perhaps wrongly!) that there may be different whitelists; one for those who cannot enter the site, and a separate for sites to which our server is allowed to speak. Or does a whitelist imply both ways?

Anyway, all help on this gratefully received and I'm imagining this is something that's been done a zillion times before!

I'm using IIS and would prefer that answer, although Apache related help just as good because I've realised I can kind of 'translate' how to do it once I've got the idea.

Incidentally, we definitely want to avoid editing the Contact 7 form's code too much becasue this may be lost when we upgrade, even though I dare say this would fix the issue. Unfortunately the latest version has the same problem, although will let the Contact 7 team know to look into this. Would ideally like to use another form for data collection of this sort although i'm a part of a team that prevents this!

And so, in …
0
Hello,
Sorry for my very limited English, i'm french.

Having a concern with a security dll provided by an external company, it responds too slowly in VB.net, 30 to 50 seconds which is unacceptable.

I am trying to create an application that would be hidden at boot time with a notifyicon and a dynamically create menu. This software would be the security management of our other software.

I then need my other software to interoperate the security dll management software, to allow the application to start and retrieve the access levels. (user / super user / admin)

I manage to manage the security part dll. My software recover all the information.

But for now I am trying to overcome two problems:
1) The dynamic creation of the notifyicon and the contextmenustrip. I can create the notifyicon, but the menu does not appear.
2) The dialogue between the 2 software. I found a tutorial to use remoting. It works perfectly, but from a console application, hence the dynamic creation of the notifyicon and contextmenustrip.

I will need a form in my management application. So I tested by creating a form with the notifyicon and the contextmenustrip.
I instantiate the form, without displaying it, and I add a menustrip to my contextMenu, but again I have the icon, but not the menu.

Code below:
 Public Shared Sub Main(ByVal args() As String)
        Try
            ' Création d'un nouveau canal d'écoute sur le port 1069
            Dim channel As TcpChannel = New 

Open in new window

0
hi all

running ex2010 with lastest SP.

after the last patching round the Microsoft Exchange RPC Client Access Service didnt start automatically on  all 3 of our primary or active mailbox servers and 3 primary CAS servers . Just wondering if anyone else experienced this?

1 mailbox server needed another restart to get the service to start again. The other 5 servers we were able to start the service manually ok.
0
Im trying to remove SHA1 across my domain.  I have a Server 2008 SP2 box but it only has MD5 and SHA hashes, no SHA256.  Is there an update that installs support for SHA2 hashes?  Server 2008 R2 are fine.
0

Security

24K

Solutions

24K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.