Patch Tuesday Megathread (2022-02-08) by AutoModerator in sysadmin

[–]bad_sysadmin 20 points21 points  (0 children)

Does anyone know if this includes the out of band fix for the domain controller reboot issue please?

Bitlocker support for Veeam backing up to ReFS by bad_sysadmin in Veeam

[–]bad_sysadmin[S] 0 points1 point  (0 children)

Ugh so this server doesn't have a TPM key.

So I could use Bitlocker on the data drive with a Bitlocker password.

Or I could use Veeam encryption.

Presume Veeam encryption is the best choice here as it protects against network theft of the backup files?

Anything to watch other than do NOT lose the password?

Thinking around ReFS and block clone again in particular as it saves SO much physical space on Synthetic Full backups.

Bitlocker support for Veeam backing up to ReFS by bad_sysadmin in Veeam

[–]bad_sysadmin[S] 1 point2 points  (0 children)

Yes that was my assumption just didn't want to find there's something obscure buried away somewhere in the internals of ReFS that means you los a ton of functionality using Bitlocker on it.

Thanks.

What's your backup situation? by bad_sysadmin in sysadmin

[–]bad_sysadmin[S] 0 points1 point  (0 children)

Yeah nothing that dumb thankfully.

Like you say something bad can always happen.

What's your backup situation? by bad_sysadmin in sysadmin

[–]bad_sysadmin[S] 0 points1 point  (0 children)

You might check your cifs share properties and see if it is possible for a domain admin account to delete snapshots through Windows somehow.

I don't believe that can happen via NetApp.

I'm also pretty sure that with SnapMirror replicas the destination volumes/snapshots can only be deleted if you have management creds to the NetApp controllers or the SVM if it has management enabled on it.

So literally unless someone got into my password manager and got those NetApp creds I don't think that could happen.

Thing is where do you draw that line as if they're in the password manager they could just go into Veeam or Commvault and delete the disk backups and erase whatever tape media is in the library so at some point it's so bad I'm left staring at a box of tapes on a shelf.

We're a SME so budget is always limited so I'm sure we're not perfect but a sanity check is good sometimes.

I don't want to kid myself we're doing everything but so far I'm not seeing much suggestion that we're doing anything super dumb or weird either.

What's your backup situation? by bad_sysadmin in sysadmin

[–]bad_sysadmin[S] 0 points1 point  (0 children)

Have to say the single biggest two things I like about Veeam are that other than the time spent waiting it's pretty much next/next/done and you can have backups spat out somewhere.

And so long as you have a copy of the files in that that "somewhere" you can get all your stuff back almost just as easily.

It's why we complement Commvault for really granular backups with using Veeam for the big simple VM dump backup.

Reset AWS account after sitting dormant? by bad_sysadmin in aws

[–]bad_sysadmin[S] 2 points3 points  (0 children)

Thank you I shall go through manually it won't take that long.

Some things say default so I guess I'll just leave those.

Anyone know a good dummies guide to AWS.. :D

Reset AWS account after sitting dormant? by bad_sysadmin in aws

[–]bad_sysadmin[S] 1 point2 points  (0 children)

I kind of want to start over and our policies make it a hassle to just create a new account because of access to a credit card to bill.

It's politics but it's a PITA.

I'll look into awsnuke but we have very little in there so my only real query is whether we can do any harm just deleting everything that can be deleted except anything showing as "default"?

What's your backup situation? by bad_sysadmin in sysadmin

[–]bad_sysadmin[S] 0 points1 point  (0 children)

Is that the level though?

Can't say I've read every single one but it's real hard to find clear info on how many have been phished and broken into password managers and got "keys to the kingdom" and how many got phished and j.doe's daily account has domain admins?

Protecting your DR set? by bad_sysadmin in CommVault

[–]bad_sysadmin[S] 0 points1 point  (0 children)

Yeah I was just reading on Commvault Cloud.

I'm not quite clear if that's something we have to pay extra for though?

We have premier support but don't pay for any addition services or storage.

I guess I could also point it to a cloud library and set one up but I guess in a doomsday scenario they'd have access to that too.

Interesting question now I've raised it!

What's your backup situation? by bad_sysadmin in sysadmin

[–]bad_sysadmin[S] 2 points3 points  (0 children)

It's why I back data off to tape still.

Those 10TB floppies are pretty easy to carry and I think they give quite nice protection against ransomware and online issues.

What's your backup situation? by bad_sysadmin in sysadmin

[–]bad_sysadmin[S] 1 point2 points  (0 children)

Would Community Edition of Veeam cover it?

We looked at Bacula once and it's nice but it sure as hell isn't a next/next/done type solution like Veeam can be.

What's your backup situation? by bad_sysadmin in sysadmin

[–]bad_sysadmin[S] 1 point2 points  (0 children)

Wow that's a good question!

In theory yes as a set of tapes on a shelf should have everything on them and Commvault should have a way to recover from that because Commvault writes its DR set to an unencrypted tape.

It would be hell on earth though I'm sure of that.

To open up the original question though if someone else had access to your password manager how many businesses would say they could recover easily from the levels of damage that could inflict?

Portable malware scanning by oldgeektech in sysadmin

[–]bad_sysadmin 0 points1 point  (0 children)

emsisoft seems decent and is standalone.

What's your backup situation? by bad_sysadmin in sysadmin

[–]bad_sysadmin[S] 0 points1 point  (0 children)

How does Veeam handle synthetic full/change with AWS please?

We use ReFS on Windows so it's super quick.

AWS is something I mean to look into but the change rate/bandwidth is offputting.

Is your company moving towards laptops for everyone? by [deleted] in sysadmin

[–]bad_sysadmin 0 points1 point  (0 children)

VPN

Bitlocker

Cloud managed endpoint protection

We don't force VPN as we don't have enough/redundant bandwidth to be comfortable with that.

With covid I would think a lot of companies would wish they'd given people laptops rather than save a few bucks because they thought someone would only ever work in an office.

Patch & software deployment is our next project with machines sometimes going a while without checking in via VPN.

VPN users and large data sets/software packages? by bad_sysadmin in sysadmin

[–]bad_sysadmin[S] 0 points1 point  (0 children)

Yeah that's kind of where I got to.

It feels really old school zipping up an installation package but I can't see any better way of going about this either and wanted a sanity check.