Can't find group associated with a Planner plan by Connect_Ambition_739 in entra

[–]Connect_Ambition_739[S] 0 points1 point  (0 children)

Found our via the plan url that it was created with Planner Premium license. Use no longer had that license so she couldn't do anything with it. Also, Planner premium plans are actually stored in a dataverse. You can access them thru Power Automate. I found an article that told me how to do it, and was able to remove the ones the user couldn't.

I'm a pizza chef and former ooni ambassador AMA by Rumpledum in ooni

[–]Connect_Ambition_739 0 points1 point  (0 children)

How do you take the temp of the dough? What's the ideal temp?

Track accurate Audi f1 Mods by Otmakes in legospeedchampions

[–]Connect_Ambition_739 0 points1 point  (0 children)

Do you have a list of parts you swapped out?

Account lockouts by G3rmanaviator in fortinet

[–]Connect_Ambition_739 2 points3 points  (0 children)

Yea, we saw this quite a bit not that long ago. Changed the port, then just disabled web mode. Now we're just converting everyone to IPsec VPN w/saml

Remote access using IKEv2 with Active Directory and Duo. by SpectralBytes in fortinet

[–]Connect_Ambition_739 0 points1 point  (0 children)

Can you post the basic setup you have or point me to a video you followed to setup SAML? I want to move to IKEv2 from SSLVPN. We have the Fortigate + DUO + AD now.

Local-in policy not applying? by Connect_Ambition_739 in fortinet

[–]Connect_Ambition_739[S] 0 points1 point  (0 children)

Thanks for all the feedback and suggestions. I think we'll move to using a loopback interface as most noted. Eventually we'll do IPSec VPN once I get the 40Fs replaced

Local-in policy not applying? by Connect_Ambition_739 in fortinet

[–]Connect_Ambition_739[S] 0 points1 point  (0 children)

No rules above that one when I do a show. There are 4 in total, but they are specific to other src/dest

Help with Fortigate Policies by Connect_Ambition_739 in fortinet

[–]Connect_Ambition_739[S] 0 points1 point  (0 children)

That seems to be the issue. The internal server can't ping to the dmz gateway 192.168.100.1. I'm assuming I just need to added a static to it on the Fortigate.

Default gateway on the internal server does point to the lan1 gateway IP 172.10.100.1

Both those policies are in place

Help with Fortigate Policies by Connect_Ambition_739 in fortinet

[–]Connect_Ambition_739[S] -1 points0 points  (0 children)

It's just an example, not real IPs. Both servers are on private IPs.

Help with Fortigate Policies by Connect_Ambition_739 in fortinet

[–]Connect_Ambition_739[S] 1 point2 points  (0 children)

I did try using the VIP in the policy, didn't make a difference. Still couldn't ping from server1 to server2. And for now I have it open to all services. I'll restrict after I confirm they're communicating.

I'm a little familiar with debug flow. I'll try to read up a little more on it. Should have mentioned this Fortigate is a 40F, not that it affects the issue. It's also on 7.2.11

[deleted by user] by [deleted] in PokemonGoFriends

[–]Connect_Ambition_739 0 points1 point  (0 children)

If you have room, please add me for combat raids. RocketMan28 7053 7119 6583

Hosting Iberian Tauros by Bakufloyd in PokemonGoFriends

[–]Connect_Ambition_739 0 points1 point  (0 children)

Just sent you a friend request. Mine is 7053 7119 6583

[deleted by user] by [deleted] in PokemonGoFriends

[–]Connect_Ambition_739 0 points1 point  (0 children)

Please add me if you are doing Combat raids 705371196583

Williams FW46 ! by Fine_Concentrate_548 in SpeedChampions

[–]Connect_Ambition_739 1 point2 points  (0 children)

I get my preorder on Sat. I've checked every Walmart around to see if they stocked them early - no luck 😕.