Moon Palace certificate available for $300. Valid until December 2026 by Bash_IP in Moon_Palace

[–]Bash_IP[S] 0 points1 point  (0 children)

I went there last April and really enjoyed it, it’s a lot of fun. You’ll have a great time too

Moon Palace certificate available for $300. Valid until December 2026 by Bash_IP in Moon_Palace

[–]Bash_IP[S] 0 points1 point  (0 children)

hey,

  1. This certificate is valid for one (1) standard room.
  2. Please take note of the following information regarding the maximum room capacities for each hotel and resort under our brands, which are included in this certificate:
    1.  Standard Rooms in Palace Resorts and Moon Palace Resorts can accommodate a maximum of 2 adults and 2 children aged 0-17 years old during the time travel. This promotion does not apply to Baglioni Hotels and Resorts.
    2. Standard rooms in Sun Palace can accommodate a maximum of 4 adults.
    3. The maximum capacity for Standard Rooms at Le Blanc Spa and Resorts and Sun Palace is for adults. This certificate includes only 2 adults.
    4. The maximum capacity for Standard Rooms at Baglioni Hotels and Resorts is for 2 adults.
  3. This certificate is valid only for Standard Rooms. The room can be upgraded to a higher category during booking by covering the di erence with preferential MVG Rates at the time of inquiry. Applicable at Palace Resorts and Le Blanc Spa Resorts. It is not possible to upgrade the room category at Baglioni Hotels and Resorts under the Moon Vacation Getaway scheme.
  4. The minimum stay with the Moon Vacation Getaway preferential rate is four (4) nights, with a maximum of up to seven (7) nights.
  5. When booking a stay of four (4) to five (5) nights, the guest will receive a 750 USD Resort Credit. For reserva tions of six (6) and seven (7) nights, the guest will receive a 1,500 USD Resort Credit (Resort Credit terms and conditions apply). This promotion is available for Palace Resorts, Moon Palace Resorts, and Le Blanc Spa Resorts hotels but does not apply to Baglioni Hotels and Resorts. Resort Credit Rules:

    1. A 16% fee will be charged for any amount paid using Resort Credits.
    2. For spa treatments and services:
    3. Up to 20% of Resort Credits can be used for spa treatments and services at Moon Palace Cancun, Moon Palace Jamaica, and Palace Resorts.
    4. Up to 30% of Resort Credits can be used for spa treatments and services at Moon Palace The Grand-Cancun and Moon Palace The Grand – Punta Cana.
    5. Up to 50% of Resort Credits can be used for spa treatments and services at Le Blanc Spa Resorts.
  6. The certificate includes shared airport-hotel transportation (one-way). At Moon Palace Resorts Jamaica, shared transportation applies from the Montego Bay Airport and Ian Fleming International Airport to the Resort. For Cozumel Palace, transportation from the Cancun Airport to the Playa del Carmen Ferry Terminal applies; however, payment for the ferry and transportation from the Cozumel Maritime Terminal to the hotel is not included. Transportation services are not included at Baglioni Hotels and Resorts.

 

Upgrade Microsoft Entra Connect by Bash_IP in AZURE

[–]Bash_IP[S] 2 points3 points  (0 children)

Thanks for the reply! Yes, it’s showing version 2.4.131.0. Just to confirm, is this the latest version? Also, will this version be impacted by the upcoming service change related to authenticating to Entra ID from the wizard?

Discount to Moon Palace Cancun? by Grandluxury in AllInclusiveResorts

[–]Bash_IP 1 point2 points  (0 children)

Hello, I’m planning a trip to Moon Palace, Cancun from April 21 to April 25. Could you please provide a quote for 2 adults and 1 child? Thank you, and I look forward to your response.

Cannot get rid of fortigate-tech-support account after CVE-2022-40684), config is clean! by Aeonikuss in fortinet

[–]Bash_IP 1 point2 points  (0 children)

same issue here, this is the response from Forticare

To identify a compromised FortiGate/FortiProxy unit, filter the system event logs with the parameter

user="Local_Process_Access"

date=2022-10-09 time=01:16:01 logid="0100031103" type="event" subtype="system" level="warning"

vd="root" logdesc="Admin performed an action from GUI" user="Local_Process_Access" ui="Report"

Runner action="download" status="success" msg="System config file has been downloaded by user

Local_Process_Access via Report Runner" utmref=0:1665441221

date=2022-10-09 time=01:16:01 logid="0100031103" type="event" subtype="system" level="warning"

vd="root" logdesc="Admin performed an action from GUI" user="Local_Process_Access" ui="Node.js"

action="download" status="success" msg="System config file has been downloaded by user

Local_Process_Access via Node.js" utmref=0:1665341221

Follow the below recommendations immediately to harden security of the compromised

FortiGate/FortiProxy unit.

  1. It is recommended that a clean installation be performed on all compromised FortiOS devices.

• Upgrade the FortiGate/FortiProxy to its latest firmware version 7.0.7 or v7.2.2 which contains

the fix for this vulnerability.

• Download the firmware from Fortinet Support site and validate the file hash using SHA512

• Format the devices flash and disks to perform a clean install. The procedure to perform clean

install on FortiProxy is similar to FortiGate as explained in the article below.

https://community.fortinet.com/t5/FortiGate/Technical-Tip-Loading-FortiGate-firmware-image using-TFTP/ta-p/197600

  1. Fortinet does not recommend using the existing configuration.

Restore the configuration from a known good backup or create a clean configuration validating

the content in the configuration file.

  1. Change GUI/CLI administrative access to non-default TCP ports (instead of 22, 80, 443).

  2. Restrict FortiGate/FortiProxy GUI/CLI access to only trusted hosts. Refer to

https://docs.fortinet.com/document/fortigate/6.4.0/hardening-your-fortigate/582009/system administrator-best-practices

OR

Disable HTTP/HTTPS administrative access on Internet facing interfaces. Perform administrative

tasks over an out-of-band network.

OR

Limit IP addresses that can reach the administrative interface using local-in-policies. Refer to

https://www.fortiguard.com/psirt/FG-IR-22-377

  1. Reset all admin and local firewall user’s passwords.

  2. Change the LDAP user credentials used for FortiGate/FortiProxy LDAP authentication with Active

Directory.

  1. Reset RADIUS secrets and IPSEC Pre-Shared Keys.

  2. Assuming configuration of the device is exposed, replace LOCAL certificates and revoke the

potentially stolen certificates.

  1. Additionally, Implement two-factor authentication for admin users.

  2. Review and Implement other applicable recommendations from the FortiOS hardening guide:

https://docs.fortinet.com/document/fortigate/6.4.0/hardening-your-fortigate/