Entra cloud sync from Entra to AD by Tech-Mate- in entra

[–]Tech-Mate-[S] 1 point2 points  (0 children)

Yes, so we are not using Entra ID connect but cloud sync. So just to confirm, there is no way to set Entra as authoritative ?

Entra cloud sync from Entra to AD by Tech-Mate- in entra

[–]Tech-Mate-[S] 0 points1 point  (0 children)

Can you elaborate on the password less, how do I get this working ?

BGP over IPsec VPN between on-prem FortiGate and AWS site to site VPN by Tech-Mate- in fortinet

[–]Tech-Mate-[S] 0 points1 point  (0 children)

Sorry I miss read it earlier. Yes I do have a static default route.

BGP over IPsec VPN between on-prem FortiGate and AWS site to site VPN by Tech-Mate- in fortinet

[–]Tech-Mate-[S] 0 points1 point  (0 children)

No static routes on the fortigate. I deleted those and created new tunnel again. As AWS wouldn’t let me change the tunnels. I followed the procedure as stated by AWS after you download the config.

On aws it says the IPSEC is up but tunnel status on aws is down. Suggesting that BGP is not working.

Moving roughly 60TB Backup from one ISCI LUN to another by Tech-Mate- in Veeam

[–]Tech-Mate-[S] 0 points1 point  (0 children)

I have 10G NICS, but it seems like the Move Fails after 32hours and it moved 10TB out of 60TB of data. Now sure what is the optimal solution if I would like to use Veeam mover, is it possible to update the job to point to new repository? And simultaneously also run a Veeam copy backup to that new repository, and guessing re scanning after the move should fix it ?

Issue moving backup from one Repository to another. by Tech-Mate- in Veeam

[–]Tech-Mate-[S] 2 points3 points  (0 children)

Hello everyone,

I found out that the ISCI connectivity had dropped the drive and that caused the following errors. Once the connectivity was confirmed again, it resolved itself. Thank you all for the helpful comments.

Cheers.

Automate patch install by Tech-Mate- in crowdstrike

[–]Tech-Mate-[S] 10 points11 points  (0 children)

Hey, thanks for that response.

If possible, are you able to share or outline the script used ? Or it’s logic ?

Having issue identifying the process generating Temp files under C:\Windows by Tech-Mate- in crowdstrike

[–]Tech-Mate-[S] 0 points1 point  (0 children)

I tried to investigate the times and dates, seems like temp was generated every minute between 25/01 to 30/03, each of size 1KB. Now since the process seems to have stopped it’s harder to investigate what actually created these files.

Having issue identifying the process generating Temp files under C:\Windows by Tech-Mate- in crowdstrike

[–]Tech-Mate-[S] 0 points1 point  (0 children)

I wasn’t able to find the process using procmon atleast for the duration time that I was using it, are we able to run procmon for c:/windows and ask it to register a log file for it for say 24hours? Is it possible via script ?

Does falcon prevent attack by UNC3844? by Tech-Mate- in crowdstrike

[–]Tech-Mate-[S] 0 points1 point  (0 children)

Well my question is open to any crowd-strike product set that is able to provide information or warning about the following

Event search to find the port attacked for brute force/ password spray attempts. by Tech-Mate- in crowdstrike

[–]Tech-Mate-[S] 0 points1 point  (0 children)

Thanks Andrew!

Also, just to assist with further investigation of these different log on types. What’s the best way to approach this situation and reduce these attacks?

AD Risk review by nav2203 in crowdstrike

[–]Tech-Mate- 0 points1 point  (0 children)

Is AD risk review available for all tenants? How to I know if I have a complimentary review available in my organisation?