azure 5 February 2021 Elasticsearch Snapshots with Azure Part 4: Create Elastic Snapshot Policy Step 1 - Click on "Snapshot and Restore"Step 2 - Select "Policies"Step 3 - Click "Create a policy"Step 4 - Fill Out
azure 5 February 2021 Elasticsearch Snapshots with Azure Part 3: Create Elastic Snapshot Repository Step 1 - Click on Menu Step 2 - Stack Management Step 3 - Snapshot and Restore Step 4 - Repositories Step 5 - Register
azure 5 February 2021 Elasticsearch Snapshots with Azure Part 2: Adding Azure Secrets to Elastic Cloud This assumes that the elastic instance is created in Azure.Step 1 - Elastic Cloud DashboardClick on the deployment that you made Step 2 -
azure 5 February 2021 Elasticsearch Snapshots with Azure Part 1: Setting Up Azure Blob This starts with the assumption that you've already created a resource groups in Azure.Step 1 - Add Resource Step 2 - Search for Storage
Microsoft 17 January 2021 OpenVAS Microsoft Access Database Upload OpenVAS CSV file to Microsoft AccessPrepare Microsoft Access for CSV upload Upload OpenVAS CSV File to Microsoft Access Repo for Microsoft Access and Power
azure 16 January 2021 Add Payment Method to Azure Portal You may sometimes need to update details of the credit card in your account information, or change the card used to pay your bill. If
Wireguard 10 December 2020 How to Install Wireguard on Ubuntu 20.04 Update and Upgrade Ubuntusudo apt-get update && sudo apt-get upgrade -yInstall Wireguardsudo apt-get install wireguardOpen the system variables file for edit. sudo nano /etc/
7 December 2020 Database Penetration Test Process/Checklist [ ] Scan for defaults ports used by the database [ ] Scan for nondefault ports used by the database [ ] Identify the instance names used by the database. [ ] Identify
7 December 2020 Router Penetration Test Process/Checklist [ ] Identify the router hostname [ ] Port scan the router [ ] Identify the router operating system and its version [ ] Identify protocols running on the router. [ ] Test for packet
Penetration Test 4 December 2020 Internal Penetration Test Process/Checklist [ ] Map the Internal Network [ ] Scan the Network for Live Hosts [ ] Port-scan individual machines [ ] Try to gain access using known vulnerabilities [ ] Attempt to establish null sessions
Penetration Test 4 December 2020 External Penetration Test Process/Checklist Some of these items are only used for Web Application Penetration Testing[ ] Inventory Company's External Infrastructure[ ] Create Topological Map of Network[ ] Identify IP Addresses of
Penetration Test 4 December 2020 Firewall Penetration Test Process/Checklist [ ] Locate the Firewall [ ] Conduct a traceroute to identify the network range [ ] Port Scan the firewall [ ] Grab the Banner [ ] Create Custom packets and look for firewall
Ubuntu 4 November 2020 Session Lock After a 15-Minute Period of Inactivity The Ubuntu operating system must initiate a session lock after a 15-minute period of inactivity for all connection types. Rationale:A session time-out lock is
28 October 2020 System Library Files Must Be Owned By Root The Ubuntu operating system library files must be owned by root. Rationale:If the Ubuntu operating system were to allow any user to make changes