Posts

Block access to consumer / Personal Gmail accounts

Image
  Block access to consumer / Personal Gmail accounts Short answer: To block access to some Google accounts and services while allowing access to your managed Google accounts (such as G Suite or Cloud Identity), you need a web proxy server that can perform SSL interception and insert HTTP headers. As an administrator, you may want to prevent users from signing in to Google services using any accounts other than the accounts you provided them with. For example, you may not want them to use their personal Gmail accounts or a managed Google account from another domain. A common means of blocking access to web services is using a web proxy server to filter traffic directed at particular URLs. This approach won’t work in this case, because legitimate traffic from a user’s managed Google account goes to the same URL as the traffic you want to block. To only allow users to access Google services using specific Google accounts from your domain, you need the web proxy server to

VMware ESX Upgrade 5.1 to 5.5

Image
The following ESX/ESXi 4.x and ESXi 5.0 versions are supported for upgrade to ESXi version 5.5: ESX/ESXi 4.0.x (including all released updates and patches) ESX/ESXi 4.1.x (including all released updates and patches) ESXi 5.0.x (including all released updates and patches) ESXi 5.1.x (including all released updates and patches) Download the ESXi 5.5 from the VMware Website. My post related to  Download vSphere 5.5 software. 1. Attach the ISO image of the ESXi 5.5 to your ESXi 5.1 if you have any remote management server tools like ILO, DRAC or insert the installation media into the server. 2. Make sure Server BIOS is configured to boot from CD-ROM 3.Once It is booted with installation media, Select  ESXi-5.5.0-1331820-standard Installer and Press Enter 4. ESXi 5.5 installer will load the Files and it may take few minutes to complete. Once it is loaded , It will Relocate the Modules and start the kernel. 5.In the Welcome Screen of VMware ESXi 5.5.0 Ins

WPA3- Coming in 2018

Image
WPA3- Coming in 2018 WPA3 is not an immediate replacement for WPA2, which will continue to be maintained and enhanced. In particular, the Alliance will introduce new testing enhancements for WPA2 to reduce the potential for vulnerabilities caused by network misconfigurations; and will further safeguard managed networks with centralized authentication services. New Wi-Fi Alliance WPA3 certified devices will take some time to filter into widespread use. Use of the new specification will require WPA3 devices and WPA3 routers -- and since the vast majority of home wi-fi users never buy a router but use the one supplied by their ISP, many users won't become WPA3 compatible before they change ISPs. That could take several years. Nevertheless, there are some welcome enhancements over the WP2 specification that has kept users largely, but not entirely, protected for around two decades. Four new capabilities for both personal and enterprise networks have been announced. Th

Prevention Guide for Petya Ransomware

Image
    While analyzing the ransomware's inner workings, Serper was the first to discover that NotPetya would search for a local file and would exit its encryption routine if that file already existed on disk. The researcher's initial findings have been later confirmed by other security researchers, such as PT Security , TrustedSec , and Emsisoft. This means victims can create that file on their PCs, set it to read-only, and block the NotPetya ransomware from executing. While this does prevent the ransomware from running, this method is more of a vaccination than a kill switch. This is because each computer user must independently create this file, compared to a "switch" that the ransomware developer could turn on to globally prevent all ransomware infections. How to Enable the NotPetya/Petna/Petya Vaccine To vaccinate your computer so that you are unable to get infected with the current strain of NotPetya/Petya/Petna (yeah, this naming is annoying), simply create a file

Virus Removal Tool

Image
Virus Removal Tool Overview Infected with a virus? Unsure whether your existing antivirus software has detected and removed it? Still having problems and unsure where to turn to next? Sophos Virus Removal Tool can help. Using cutting edge technology found in our enterprise-grade software, this powerful tool detects all types of malicious software on your computer—including viruses, spyware, rootkits and Conficker—and returns it to a working state. The tool has direct access to virus data from SophosLabs, our global network of threat researchers, ensuring that even the very latest viruses are detected and removed. And it works alongside your existing antivirus. For full details of how to use the tool, refer to the article Sophos Virus Removal Tool Here’s how Download the tool, run the program and put the Virus Removal Tool on your desktop. Double click Sophos Virus Removal Tool and then click the Start scanning button The tool scans your computer and removes any viruses it finds You’re

What is Internet of Things?

Image
What is Internet of Things? You've likely heard the phrase "Internet of Things" — or IoT — at some point, but you might also be scratching your head figuring out what it is or what it means. The IoT refers to the connection of devices (other than typical fare such as computers and smartphones) to the Internet. Cars, kitchen appliances, and even heart monitors can all be connected through the IoT. And as the Internet of Things grows in the next few years, more devices will join that list. We've compiled a beginner's guide to the IoT to help you navigate the increasingly connected world. Terms and Basic Definitions Below, we've provided a glossary defining the Internet of Things: Internet of Things: A network of internet-connected objects able to collect and exchange data using embedded sensors. Internet of Things device: Any stand-alone internet-connected device that can be monitored and/or controlled from a remote location. Internet of Things ecosystem: All t

How to setup CFS policies with LDAP and SSO to restrict internet access

Image
How to setup CFS policies with LDAP and SSO to restrict internet access (SW7782) Was this article helpful? Title How to setup CFS policies with LDAP and SSO to restrict internet access Description Using Multiple Custom content Filter policies with LDAP and SSO to restrict Internet access (CFS + LDAP + SSO) Resolution This article explains about how to integrate Premium Content Filtering Service with LDAP (With Single Sign On). Restricted user group on the active directory is imported to SonicWALL and give restricted web access to those users in that group. Wherein the Full Access User group has full access or partial access to websites Click To See Full Image. Deployment Steps  To integrate Premium Content Filtering Service with LDAP, follow these steps: Step 1: Configuring Content Filter and Policies Step 2: Configuring LDAP on SonicWALL Step 3: Importing Groups from LDAP to SonicWALL unit Step 4: Configuring SSO on SonicWALL Step 5: Configuring Single Sign on Agent on Workstation Ste