TLS1.2
Azure AD Connect: TLS 1.2 enforcement for Azure Active Directory Connect – Microsoft Entra | Microsoft Learn Enable TLS1.2 Run the following with elevated PowerShell Check TLS1.2
Azure AD Connect: TLS 1.2 enforcement for Azure Active Directory Connect – Microsoft Entra | Microsoft Learn Enable TLS1.2 Run the following with elevated PowerShell Check TLS1.2
Database (MSSQL) TCP 1433, 135, 1434, UDP 1434 Script below require elevated PowerShell Remote Desktop TCP 3389 Enable Script below enable RDP capability and enable existing RDP firewall rule Disable Script below disable RDP capability and enable existing RDP firewall rule
Objective We have a printer here which can send email via SMTP. However, Office 365 is quite finnicky on the configuration. This article is extracted from How to set up a multifunction device or application to send email using Microsoft 365 or Office 365 | Microsoft Docs What do we need? We’ll need FIXED-IP for... » read more
Enable SSH Go to Configuration > Add-ons Add-On Store button Find Terminal & SSH Click on Install After installation is completed, we can toggle “Show in sidebar” Go to Configuration page We can add authorized keys (sample below) Add port number in Network section Remember to click Save button Go back to Info tab Click... » read more
What is WSUS? WSUS helps controlling Windows update on client and server machines. In this article, we are not doing local publishing. Firewall (Egress) The following is needed to be allowed (access can be managed with proxy server): http://windowsupdate.microsoft.com http://*.windowsupdate.microsoft.com https://*.windowsupdate.microsoft.com http://*.update.microsoft.com https://*.update.microsoft.com http://*.windowsupdate.com http://download.windowsupdate.com https://download.microsoft.com http://*.download.windowsupdate.com http://wustat.windows.com http://ntservicepack.microsoft.com http://go.microsoft.com http://dl.delivery.mp.microsoft.com https://dl.delivery.mp.microsoft.com We’ll need to... » read more
Requirements Hosts For preparation of RPi, we can use this article. rpi-01 rpi-02 rpi-03 Architecture Replicated across 3 nodes Install System Configuration Host file Firewall Add the following ruleset Check the configuration is readable by following command Enable firewall rule Join master node: Mount partition Create gfvolume Replacing Brick If any brick has failed, we can... » read more
Requirement Certificate will be needed to validate LDAP server securely Environment iDRAC settings (especially network related) has already been configured Internal CA already configured Internal CA certificate has already been installed on end-point machines Latest iDRAC version is installed DNS is working as per intended Domain Controller is enabled with LDAP Domain service account is... » read more
Requirement Environment Certificate Template Certification Generate Certificate Signing Request (CSR) Sign CSR on CertSrv Sign CSR on CA Upload signed certificate
Notice iDRAC8 will reach End-of-Software maintenance on Feb 2024. The last update is 2.83.83.83 Migration to SHA-256 If we are upgrading iDRAC from version earlier than 2.40 (not inclusive), to version later than 2.61 (inclusive), we will meet error RED007: Unable to verify Update Package Signature. To bypass this, we’ll need to update twice: Once... » read more
I’ve just finished reading Storytelling With Data by Cole Nussbaumer Knaflic. Below are my own personal notes, most of which I think relate closely to implementation in automation industry usage. What to convey This is where most of the stakeholder miss the most. We will need to have a lot of context to deliver actionable... » read more