Windows: How do I find an LDAP User and their Group Base DN for Microsoft Active Directory?

To find the user and group base DN, you can run a query from any member server on your Windows domain. To find the User Base DN: - Open a Windows command prompt. - Type the command: dsquery user -name <known username> (Example: If I were searching for all users named John, I could enter … Continue reading Windows: How do I find an LDAP User and their Group Base DN for Microsoft Active Directory?

Advertisement

Tools: How to identify and clean up Windows computers infected with malware and bots

Solution: Follow the steps below in the given order: Step 1: Disconnect the computer from the network and notify the user that the computer cannot be re-connected until all malware has been successfully removed. Step 2: Find out if the user is familiar with the destination or action that the malware or bot is trying … Continue reading Tools: How to identify and clean up Windows computers infected with malware and bots

Tools: Test your Firewall’s AV, Anti-Bot and Threat Emulation functions

Found this tool from CheckPoint to test your AV, Anti-Bot and Threat Emulation function. https://threatwiki.checkpoint.com/threatwiki/public.htm Test Threat Emulation Click to download a DOC with an exploit. This file will not harm your computer. To confirm the file was detected, use the Smart Log / Smart View Tracker to locate the Threat Emulation log for this … Continue reading Tools: Test your Firewall’s AV, Anti-Bot and Threat Emulation functions

TMG Forefront 2010: Re-enabling Configuration Change Tracking Description

If you check the box Do not show this prompt again you will, of course, not be prompted to enter descriptions for applied changes in the future. If you later decide you’d like to have this feature back, highlight the Troubleshooting node in the navigation tree and select the Change Tracking tab in the main window. In the Tasks pane click Configure Change Tracking and check … Continue reading TMG Forefront 2010: Re-enabling Configuration Change Tracking Description

What Are Email Vulnerabilities And How Can We Secure Our Email Account

E-mail is one of the most widely used Internet services today. The services which are generally used in the e-mail Infrastructure are Simple Mail Transfer Protocol (SMTP) and Post Office Protocol version 3 (POP3) or Internet Message Access Protocol (IMAP). The client communicates with e-mail server through Simple Mail Transfer Protocol (SMTP) and retrieves a … Continue reading What Are Email Vulnerabilities And How Can We Secure Our Email Account

Symantec ProxySG: Error: NET::ERR_CERT_COMMON_NAME_INVALID when accessing secure web sites via ProxySG or ASG

Affected Products Chrome browser version 58 and later, and: accessing secure websites hosted behind a ProxySG (reverse proxy) or accessing other websites through a ProxySG or ASG where redirect-mode authentication is performed over SSL or accessing the management console, via any version of the ProxySG or Advanced Secure Gateway (ASG). Overview The latest versions of … Continue reading Symantec ProxySG: Error: NET::ERR_CERT_COMMON_NAME_INVALID when accessing secure web sites via ProxySG or ASG