The following simple script will iterate though your vCenter environment and remove the floppy disk from VMware guest machines that are in a powered off state. Script text: I used Windows PowerShell ISE Set-ExecutionPolicy RemoteSigned #may require running as administrator Import-Module VMware.VimAutomation.Core Connect-VIServer -Server ‘your.server.here’ $off = Get-VM | where {$_.powerstate -eq “PoweredOff”} $floppy = […]
Tag: Security
Excellent video and start to a security web series about security starring actor Christian Slater. Purposed to elevate security awareness around the risks that businesses and consumers face daily. “The Wolf, highlighting how corporate networks can be hacked and what companies must do to protect themselves.” [youtube id=”U3QXMMV-Srs” width=”600″ height=”350″] If you’re not taking your […]
I noticed that my Windows VPN client on my computer was forcing all traffic through the gateway of my VPN endpoint. Something that in most cases would be fine however this limited my ability to access local network resources in addition to browsing the internet via my local internet provider (Split Tunneling). What I soon […]
Recently I had a chance to get my hands on this excellent Firewall by Checkpoint. And as you know not everything goes perfectly, and this is where you get a chance to learn how it works, while you fix. I encountered an issue where one of the Threat Prevention Blades was stuck in updating mode […]
I recently configured IRM to protect documents and email communications as part of a security initiative. Information Rights Management (IRM) in Exchange Online uses Active Directory Rights Management Services (AD RMS), an information protection technology service in Office 365. IRM protection is applied to email by applying an AD RMS rights policy template to an […]
Microsoft Azure Rights Management provides a comprehensive policy-based enterprise solution to help protect your valuable information, no matter whom you share it with. These policies help improve data security using both Both Information Rights Management and Office 365 Message Encryption To activate rights management: Log into Office 365 with an account which has been assigned an […]