Veeam, vSphere 6.5, Restore job failed Error: A specified parameter was not correct: spec.vmProfile

Just a tech short on how to get past the following error: Restore job failed Error: A specified parameter was not correct: spec.vmProfile.
This was encountered when testing backups via the Veeam console

This error could also be seen in vCenter

 

After some digging around I was able to get a better understanding of why it was occurring. Each time this failure would occur I would see a message “Failed to set story profile VM Encryption Policy …

But I am not using encryption policies.!

This is new in vSphere 6.5 and allows for the encryption of storage where the VM would reside.
To work around this I needed to browse my datastore tree for the intended datastore rather than searching by name; What I had been previously doing.

You may see this as ‘Default policy’ container.  Select the datastore and continue as normal and you should have a successful restore.

Best of luck to you.

 

Check Point Firewall: Disconnect VPN or Mobile Access Clients

If you have a need to disconnect a user from the firewall forcibly. There are a few ways I am aware of that will force users off the VPN.

Installing Security Policy (link)-  clears the cached authentication of the remote user, although this doesn’t seem to disconnect them it prompts them to re-enter credentials.

Expire the user with SmartDashboard or change the user’s password and then push the Security Policy.

Logging into the console of the firewall and using the vpn tu command to disconnect users.
(link) – VPN Commands:  (link)

My favorite method is to SmartVire Monitor:

Open SmartView Monitor > Users > click on any of the options: Users by Gateway, Users by Name, All Users, CheckPoint Mobile Users and after finding the user you want to disconnect, right click on it and Reset Tunnel.

Gain access to former user’s OneDrive data

In most organizations, you will have the employees leave at some point.  In most cases, you will you probably want to access and protect their data. Data such as documents and emails and then transfer ownership to a manager or new employee.  Performing a dump of the users home directories and contents of a hard drive is common practice, like that of exporting their PST from Outlook or even directly out of Office 365’s compliance center.  Often overlooked is the contents of the users OneDrive.

OneDrive for Business may have been used to not only store and share documents but an archive space for the employee.  Please note that OneDrive offers the user the ability to keep its contents synced with the user’s computer or just in-cloud.  So the traditional method of backing up the computer may not always apply in this area.

I suggest taking the following steps to gain access and download the contents:

  1. Sign in to Office 365 with your admin account – Account having administrative privileges
  2. Go to the Office 365 admin center.
  3. Go to Active users and select the user.
  4. Expand OneDrive Settings in the user details pane, and then click Access files.
  5. Copy the files to your own OneDrive for Business or a common location.

Note:

  • If you only remove a user’s license but don’t delete the account, the content in the user’s OneDrive will remain accessible to you even after 30 days by default
  • Before you delete the account, you should move the content of their OneDrive to another location that’s easy for you to access. If you already deleted their account, you have 30 days to restore it.

If the account license has been removed, then the following steps can be used:

  1. Sign in to Office 365 with your admin account – Account having administrative privileges
  2. Go to the Office 365 admin center.
  3. Goto SharePoint
  4. In the SharePoint admin center, Select ‘user profiles’
  5. Select manage user profiles
  6. Enter former user’s account name under find. – Note: you may have to switch from Active Profiles to Profiles Missing from Import

  7. Choose the account and click the small (almost not seen) black arrow and select Manage site collection owners to add your admin account site collection administrators
  8. Once added as a site collection owner you can choose manage the personal site to access the setting page of that user’s OneDrive for business site settings
  9. Next, change the URL “setting.aspx” at the end of the url to “onedrive.aspx”

You should now be in the users One Drive Folder to view contents.

 

 

Mount NFS Share in Windows 10

Where is a need, there is a how-to do it for my friends.  Today it’s mounting of a NFS Share via Windows 10

Install the NFS Client (Services for NFS)
The first thing we need to do is install the NFS Client which can be done by following the steps below:

Step 1: Open Programs and Features.

Step 2: Click Turn Windows features on or off.

Step 3: Scroll down and check the option Services for NFS, then click OK

Step 4: Once installed, click Close and exit back to the desktop.

How to Mount an NFS Share
From the Windows Machine, Open the Command Prompt or Power Shell Prompt type the following command:

mount -o anon \\host-ip\nfs-share-name drive-letter:

The share is now mounted and we can access the data by navigating to the X: drive.
To validate your successful mount you can use the following command “mount” to review your connected mount points

 

6 search engines that abuse your privacy (and 3 that actually preserve it)

The following is a share from the folks over at @Techwarn – Enjoy

With the rise of modern browsers, search engines have become seamlessly integrated into our internet experience. Gone are the days of typing out “www.google.com”—now one only needs to type a query into the search bar (or address bar, in many cases), and in come the results.

Because of this streamlined experience, we’re less likely to think critically about what search engines we use. On Chrome? Sure, Google will do. Internet Explorer? Take me away, Bing!

The problem with this laissez-faire attitude is that it has a sizeable effect on how we experience the internet. Not only do search engines vary in their algorithms, thus impacting search results, but they also have radically different privacy policies. Depending on who you’re doing your searching with, you could be putting random facts about yourself up for sale.

The Naughty List

Google

The scope of data collection: Enormous (don’t forget, Google follows you on YouTube)
Ads: Yes
Noteworthy characteristics: It probably knows everything about you *sinister laugh*

Google may be the most popular search engine around—in 2014 it hosted 67.5% of all searches in the U.S.—but it’s a terrible choice when it comes to privacy.

As the search engine’s privacy policy informs visitors, Google tracks just about everything, including your search queries, your IP address, your phone number, your hardware settings—and more!

According to Google, all of this data collection is done for the benefit of users:

“We collect information to provide better services to all of our users – from figuring out basic stuff like which language you speak, to more complex things like which ads you’ll find most useful, the people who matter most to you online, or which YouTube videos you might like.”

If that degree of intrusiveness makes you queasy, though, fear not: You can always make Google forget about you. You can also prevent Google from knowing your location data in the future by using a VPN extension on Chrome.

Once you clear your slate, you might also want to check out one of the search engine options on the Nice List.

Yahoo

The scope of data collection: Large
Ads: Yes
Noteworthy characteristics: Its affiliated email system was recently hacked

Things have not been good for Yahoo lately, what with the disclosure that some 500 million Yahoo Mail accounts were hacked. That event alone turned many privacy-minded individuals away from the company.

Yahoo’s search engine isn’t anything to write home about (it’s “powered by Bing”), but it does have an ad interest manager that lets you stop Yahoo from tailoring the ads you see. It doesn’t stop ads from appearing altogether, but it at least makes the browsing experience slightly less stalkerish.

Bing

The scope of data collection: Large
Ads: Yes
Noteworthy characteristics: It knows almost as much about you as Google does

The second most popular search engine in the U.S. (partially because it “powers” other search engines), Bing also records your search queries and other relevant information. However, because it is not integrated with as many popular platforms like Google (like YouTube), it could be seen as slightly less intrusive.

That still isn’t saying much. A visit to Bing’s privacy page paints a detailed picture of all the lovely things you share when you do a search:

“When you conduct a search, or use a feature of a Bing-powered experience that involves conducting a search or entering a command on your behalf, Microsoft will collect the search or command terms you provide, along with your IP address, location, the unique identifiers contained in our cookies, the time and date of your search, and your browser configuration.“

All in all, that’s some fairly identifiable non-identifiable information.

AOL

The scope of data collection: Large
Ads: Yes
Noteworthy characteristics: Filled with nostalgia for anyone online in the 90s

AOL (sometimes written as Aol.) is similar to Yahoo in that it is “powered by Bing.” It’s also similar to its purple competitor in that it faced a privacy scandal of its own: In 2006, the company published the search histories of 650,000 users.

Frustratingly, AOL’s privacy page is far less detailed than those of other search engines. Rather than giving you a list of exactly what data it collects, the page remarks, “We collect and receive information about you and your device when you give it to us directly when you use our Services, and from certain third-party sources.” There are no hyperlinks for further explanation, no pleasant footnotes.

Basically, use AOL at your privacy’s risk.

Ask

The scope of data collection: Large
Ads: Yes
Noteworthy characteristics: Its search toolbar is often bundled with other software, and it’s hard to get rid of

Ask (known as Ask Jeeves in another life) has grappled with its identity during its 20-year existence. Sometimes a question and answer site, sometimes pure search, it has lately slunk to the back of the pack in terms of volume.

Thankfully, it’s much more straightforward than AOL when it comes to letting you know what information it collects, including, “your mobile device’s geographic location (specific geographic location if you’ve enabled collection of that information, or general geographic location automatically).” Reassuring stuff.

What makes Ask a bit more aggravating, however, is its occasional role as a “browser hijacker.” Sometimes when you download an application from the internet, it will bundle in a “helpful” Ask search toolbar which you’ll install because you didn’t read the conditions when you were blindly clicking “Accept, Accept, Accept…” The result: Ask becomes your automatic search engine on all your browsers.

Even if such practices aren’t malware per se, they can still be pretty annoying, especially given all the data Ask can suddenly get its hands on.

Lycos

The scope of data collection: Large
Ads: Yes
Noteworthy characteristics: It’s still around

Lycos has gone through many iterations since the Dotcom Bubble and has even been sighted trying to spin off a brand of wearables. Will this new incarnation work? You be the judge.

Like other search engines on the naughty list, Lycos harvests a lot of data, including your IP, browser, and platform. It makes a point of saying that it collects “aggregate search terms,” which at least suggests that individual searches are not tied to your IP (hopefully).

The Nice List

Ixquick

The scope of data collection: Non-existent
Ads: No
Noteworthy characteristics: Open search results with proxy service

ExpressVPN is no stranger to Ixquick. The search engine has been wowing the privacy-minded since 1998, and despite having slower loading speeds than other services, it offers relatively strong results.

One feature that sets Ixquick apart is that it gives users the option to open search results in a proxy window, thus allowing them to view pages anonymously. The load times can be fairly slow, however, so it might not be practical for those on a deadline.

Ixquick takes a reassuring approach to privacy. The site proclaims, “You have a right to privacy,” and, “The only real solution is quickly deleting your data or not storing them to begin with.”

ExpressVPN wholeheartedly agrees.

StartPage

The scope of data collection: Non-existent
Ads: Yes
Noteworthy characteristics: The performance of Google without privacy infringement

StartPage is an offshoot of Ixquick that queries Google, basically acting as a go-between. That means you get all the power of a Google search minus the disclosure of your personal information. The only downside is that you still get ads, but at least they aren’t aimed at you.

StartPage, like Ixquick, offers a proxy option for exploring search results. However, it is still somewhat slow and sometimes results in page rendering errors.

Another great thing about StartPage? It stopped recording users’ IP addresses in 2009.

DuckDuckGo

The scope of data collection: Non-existent
Ads: No
Noteworthy characteristics: It offers a Tor service (3g2upl4pq6kufc4m.onion)

ExpressVPN previously reviewed DuckDuckGo and loved it. It doesn’t collect your IP address or other information, but it does record searches—it just aggregates them without affiliating them with other data.

DuckDuckGo is also unique in that it offers an onion service. This characteristic, along with its speed, makes it a top pick.

Of course, DuckDuckGo’s algorithm opts for the crowd-sourced over the corporate. A search on the current U.S. presidential election in the “News” category brought up Wikipedia articles as the top two hits, so be sure to look further down the list if you want more variety.

Source: https://www.expressvpn.com/blog/6-search-engines-abuse-your-privacy/