Vue lecture

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.

Disable SMBv1 and enable SMBv1 auditing

Windows still includes some legacy protocols that pose significant security risks. This applies to SMBv1/CIFS, which Microsoft is gradually phasing out. While it is still present in new Windows versions, it is disabled by default. The audit feature can detect SMBv1 requests and assess whether the protocol is still required.

Announcing 4sysops AI

We have just added an experimental feature to 4sysops. At the end of every blog article, you will find a chatbot that enables you to ask questions about the article. You may use this feature if you need further clarification or want to gain additional information not covered in the article.

LM Studio: Run a local AI on your desktop or server

LM Studio is a free tool that allows you to run an AI on your desktop using locally installed open-source Large Language Models (LLMs). It features a browser to search and download LLMs from Hugging Face, an in-app Chat UI, and a runtime for a local server compatible with the OpenAI API. You can use this server to set up a development environment before deploying a more extensive LLM system or even run your ChatGPT clone without sharing your corporate data with third parties.

Connect an Azure Function or Web App to a Key Vault to retrieve secrets with PowerShell

Azure Functions often require access to sensitive information. It is a security risk to store credentials in code or configuration files. Thus, protecting sensitive information like connection strings, API keys, or passwords is crucial. This is where Azure Key Vault comes in, offering secure and centralized storage for all your secrets. In this article, I will explain how to retrieve secrets from the Key Vault within an Azure Function using PowerShell.

Tuning Ceph performance

Tuning Ceph performance is crucial to ensure that your Ceph storage cluster operates efficiently and meets the specific requirements of your workload. As Ceph installations, both in software and hardware, are upgraded or as your workload changes, the default tunables that were optimal at one time may now be obsolete or counterproductive.

Simulating complex networks with GNS3

The free Graphical Network Simulator-3 (GNS3) allows for the planning and practical simulation of networks and their topology. Thanks to Dynamips, it also supports integrating images of Cisco IOS. GNS3 can be integrated with physical hardware, enabling, for instance, the testing of monitoring solutions.

Create bootable ISO for Windows image (.wim)

Before deploying to clients, you should update a Windows image with the latest patches and customize it to meet their needs. Depending on the deployment method, you need to provide the WIM archive on a bootable ISO file. This can be created using the tools from the Windows Assessment and Deployment Kit (ADK).

Manage Docker with VS Code

You can manage Docker images and containers directly within Visual Studio Code (VS Code) with Microsoft's Docker extension. This article walks you through adding Docker files to a Workspace, creating a containerized application environment, and explains how to build and run Docker containers directly from the VS Code interface.

An example of using PowerShell to manage system and user-assigned managed identities in Azure

Managed identities provide secure authentication for resources accessing other resources in Azure without requiring sensitive information such as secrets, credentials, and certificates to be handled. Microsoft Entra ID manages these identities, enabling applications to obtain tokens for authentication. In this post, I will provide an example that illustrates how to use system and user-assigned managed identities with PowerShell.

Analyzing Windows Event Logs with Security Onion

Security Onion is an open-source platform for threat hunting, security monitoring, and log management. It aggregates free tools such as Kibana, Elastic Fleet, InfluxDB, CyberChef, and Suricata. The solution provides access to these tools via a web console. I'll demonstrate how it can be used for analyzing Windows logs.
❌