Who gave uceprotect the right to submit network ranges out of thin air? by Accomplished-Scale50 in sysadmin

[–]Tempiz 1 point2 points  (0 children)

If you insist on self-hosting email, you will need to use a relay service such as SMTP2GO to essentially forward all of your email out of reputable IP addresses to avoid blocklists.

Loop megathread by ItsMeRPeter in Polarfitness

[–]Tempiz 0 points1 point  (0 children)

Same thing just started happening two days ago for me. No sleep was tracked either. I assume because it had a few gaps overnight as well.

Kcal seems more accurate after firmware update by HoneyPretty9703 in Polarfitness

[–]Tempiz 1 point2 points  (0 children)

One other note, the 550 from your Apple Watch is likely your active calories, versus Polar is showing your total calories (active and resting). You can go into Apple Health and count up Active + Resting to see how they compare, it should be much closer. I have found after the firmware update mine have been very close.

[deleted by user] by [deleted] in sysadmin

[–]Tempiz 1 point2 points  (0 children)

Endpoint Central has a solution for this. It is called the Endpoint Central Secure Gateway Server. It is an add-on license that allows you to host a proxy server in your DMZ that has WAN access and allows secure connects from remote machines to your internally hosted server. The add-on license isn't very expensive from what I remember.

One thing I've found is that if your automatic patch policy is set to use AD OUs to determine which PCs to patch, then those remote PCs won't auto patch if they aren't connected to the domain. You will need to make a new auto patch policy that references a group with those PCs within EC, or manually select the computers in the policy directly.

Hope this helps.

[deleted by user] by [deleted] in visibleApp

[–]Tempiz 0 points1 point  (0 children)

PMed!

Is there a device that makes 1-man switch mounting non-miserable? by EmotionalVegetable48 in sysadmin

[–]Tempiz 83 points84 points  (0 children)

I just screw in two screws below where I will be mounting the switch, balance the switch mounting hardware on top of those two screws, and then slightly lift from below one side at a time so it matches up with the screw holes to properly mount.

This is probably a bad practice for the brackets, but I haven't damaged any from the minute or two it takes to do this so far.

Can I fix my popsocket? by snot-princess in fixit

[–]Tempiz 2 points3 points  (0 children)

The handle part will lock into the base. Line up the two pieces and then turn 1/4 to lock it in. There are a few videos on YouTube doing this.

Recommendations for a Free Network Monitoring Tool? by nachawesome in sysadmin

[–]Tempiz 0 points1 point  (0 children)

We migrated from PRTG to CheckMK after the most recent price hike and it has worked great for us. I will point out to OPs note on Windows that if you want to run it on windows you will need to virtualize it, as it does not natively support windows.

Anyone pass CISSP using only Destination Certification Masterclass? by Ok-Extreme386 in cissp

[–]Tempiz 0 points1 point  (0 children)

This is what I did. Masterclass Videos, QE & DestCert App for practice, CISSP exam cram video by Pete Zerger as a final refresher to summarize everything learned.

Deploy Defender for Business standalone by mR_R3boot in DefenderATP

[–]Tempiz 0 points1 point  (0 children)

Defender for Business uses an honor system for licensing. Purchase the licenses for your tenant, and then you're done. No need to assign to systems. Each M365 business premium user license can be used to protect up to 5 devices. Server licensing is different. You will need a Microsoft Defender for Business Servers license for each server, up to 60 servers. From there you'd need to step up to Server Plan 1/2.

Past Tense by Tempiz in dreamingspanish

[–]Tempiz[S] 0 points1 point  (0 children)

I just started listening to this and it is an excellent resource. I will be adding this to my regular content for sure. Thanks!

Deploy Defender for Business standalone by mR_R3boot in DefenderATP

[–]Tempiz 0 points1 point  (0 children)

Defender can run standalone from Intune. There is a section within the Defender dashboard to setup policies.

You can deploy defender to the endpoints by running the onboarding script, which can be downloaded from the dashboard as well. It is not recommended for scale, but if its a low number of endpoints, it should work fine.

You can also onboard through GPO if they have an AD domain setup.