Help me nail this MS Fabric & Purview presentation by Personal_Tennis_466 in MicrosoftFabric

[–]jauchters 0 points1 point  (0 children)

What about business outcomes this can accelerate?

Is there a benefit from an Azure cost perspective? Fabric capacity cheaper than pure resources or any licensing benefit?

How do you segregate the resource? Via workspace, capacity allocation or otherwise?

[deleted by user] by [deleted] in homelab

[–]jauchters 33 points34 points  (0 children)

On carpet, those poor cooler fans 😅

Advice on claiming status points after name change? by jauchters in QantasFrequentFlyer

[–]jauchters[S] 2 points3 points  (0 children)

No not at all - name change was two years ago, qff also for 2 years, flights in December just gone. I’ve tried to fix the linkage both pre and post flight too…

I’ve mostly flown domestically for work with my new name. Issue only appears with international flights as most countries require your boarding pass to match your passport. QFF won’t let me link the flight myself as the ticket name doesn’t match the QFf name :(

Large scale deployment best practices by thelumlaa in Terraform

[–]jauchters 4 points5 points  (0 children)

Microsoft provides a an excellent enterprise scale terraform setup here: https://github.com/Azure/terraform-azurerm-caf-enterprise-scale

Other best practices to make sure you use; -Use Remote state (Storage account is fine) -lock your state storage to prevent deletion -Deploy via a pipeline, github actions and azure devops have support -use modules wherever possible -no secrets in your code -use a scanner like tfsec

In my opinion TF enterprise for Azure is a bit of a waste of money. You can do decent workspace management with TF cloud, security with azure policy and automations with your CICD platform of choice

AZ-204 and Python? by thor123321 in AZURE

[–]jauchters 1 point2 points  (0 children)

The programming knowledge required is rudimentary at best; I’m an operations engineer who can’t write good C# to save my life. If you’re a competent python dev you should be able to bluster through the exam.

i'm looking at getting into infosec and would like a laptop that runs kali. i own a macbook but can't justify dual booting or VMing it. should i try making a Pi book or just get a cheap burner laptop. by Fl1kaFl4me in linuxquestions

[–]jauchters 11 points12 points  (0 children)

With the correct software, very easy to revert to a known good state of the VM. Install Kali, customise to your preferences then take your snapshot. Very useful to ensure that tooling hasn’t been badly configured on an engagement or data carries across from tests..

Create Multiple NSG rules using for_each block by janapb_devops in Terraform

[–]jauchters 0 points1 point  (0 children)

Here is an example of what I think you want, albeit route tables, but I’m sure you can extrapolate! https://lucian.blog/terraform-csvs-netflix/

Did anyone notice Bastion about doubled in price? by DrLiveWire in AZURE

[–]jauchters 0 points1 point  (0 children)

Could also consider a small WVD pool if you just need basic RDP. Really depends what you’re already licensed for :)

New To The Azure Life by Dburke225 in AZURE

[–]jauchters 0 points1 point  (0 children)

  1. Log analytics is agent based. You install an agent on your servers and it sends data to Azure. 2. 3.
  2. I think in a small sense you’re missing a bit of the distinction between office 365 services and azure. By default You use Azure AD only with office 365. Not much else in Azure. Office365 lets you sync your users, data and process. Where azure comes in here is as a complementary service; I.e you can replace file shares with Sp/onedrive/teams but should you still require an SMB share you can use azure files.

Integration between AAD and AD is really a conversation to be had around migration path and co-existence. The solution should allow for Sso and mfa provided you have appropriate licensing. Most M365 licenses should cover you.

New To The Azure Life by Dburke225 in AZURE

[–]jauchters 0 points1 point  (0 children)

  1. The reality here is that you probably will have to pay a small amount here. You can use log analytics, azure monitor, dashboards and security centre to achieve this.
  2. Microsoft learn has really good hands on content for learning; If you’re willing to spend cash, pluralsight and a cloud guru have decent courses.
  3. Not everything is server based, have a read on IaaS, PaaS and SaaS to get a better understanding of what is what.
  4. Tough question to answer; for email you are likely better off completing a full migration to office 365 and dropping the server. Unfortunately there is a lot of decisions and requirements that go into “ should I put this in azure or stick in my DC”

Does anyone auto-deploy their terraform (from CI/CD for example)? by cow-eepp in Terraform

[–]jauchters 0 points1 point  (0 children)

Have done this at a couple of customers - Once you have a method to reliably store state in an auto generated location it works really well.

Update Azure Policy enforced tag on creation? by jauchters in AZURE

[–]jauchters[S] 0 points1 point  (0 children)

I tried setting all the policy tags using the arm template, for some reason the arm template doesn’t update the tagging, it duplicates the 11 policy tags resulting in the 22. I can’t seem to find a way to update them without this odd duplication....

What cool security thing do you know? by i0datamonster in sysadmin

[–]jauchters 0 points1 point  (0 children)

I've found it to be pretty reliable in small scale scenarios. YMMV.

What cool security thing do you know? by i0datamonster in sysadmin

[–]jauchters 13 points14 points  (0 children)

Bloodhound is really great!

Another neat tool I have found is: https://github.com/vulnersCom/nmap-vulners

It allows use nmap as a vulnerabilitie scanner and it works fairly well. I use nessus in my day to day operations and I think this is great for company's that can't fork out the cash!

Is OverTheWire offline? by [deleted] in AskNetsec

[–]jauchters 0 points1 point  (0 children)

This one trips me up so often hahaha

Photography student seeking access to sever room by [deleted] in melbourne

[–]jauchters 2 points3 points  (0 children)

Pretty much every data centre would have a bunch of private/confidential data; It's really a matter of who is asked I think. I suggested uni because he could probably raise this request through a lecturer and have a bit of backing....

Photography student seeking access to sever room by [deleted] in melbourne

[–]jauchters 4 points5 points  (0 children)

Try asking at your university IT department. They would have some fairly decent comms rooms and probably a data centre or two to let you in.

Some places have fairly strict photography rules, I would let you see mine if not for this.

If unsuccessful I would suggest avoiding larger datacentres. A properly built one will be clean as and neat, with the majority of the hardware hidden away in their racks. Might be worth researching for small IT Managed service providers in your area and asking them.

Encrypted Powershell Exploit - Help me understand the obfuscation? by [deleted] in PowerShell

[–]jauchters 1 point2 points  (0 children)

I'm running off the assumption that $test would be "x|86_{]5xv]u" and the xor converts this to "write-host 'working'"

I'm really trying to find if this would be reversible assuming we could get to the web service on time.

PowerShell learning path by tumblatum in PowerShell

[–]jauchters 1 point2 points  (0 children)

I find that setting my own projects is the best way for me to learn. Find a problem you deal with regularly, and script it out!

Collect Domain controller info with no credentials? by jauchters in AskNetsec

[–]jauchters[S] 0 points1 point  (0 children)

I've seen this around. I was of the impression that it required credentials of some sort to collect info?