Fix from a elevated Command prompt:

 

·         Type netsh winsock reset and then Enter.

·         Type netsh int ip reset and then Enter.

·         Type ipconfig /release and then Enter.

·         Type ipconfig /renew and then Enter.

·         Type ipconfig /flushdns and then Enter.

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

Recently we found a Fortigate Router not listening locally 

Login to Console via Serial Cable ( Putty ) 

config system interface
edit wan1
set allowaccess ping http https
end


config system admin
edit admin
set trusthost1 %publicip%/32
set trusthost2 %localIprange%/24
end
VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)
  1. Check the volume has enough free space, if a previous merge (deletion of checkpoint ) has failed this might be why

Navigate to the cluster share and check the .avhdx’s

Windows Explorer - VHDX AVHDX File

 

Hyper-V Console Method

You can also use the Hyper-V console in Windows 10 to perform the merge operation. The first thing you’ll want to do is open the Hyper-V console. Next, right-click the Hyper-V host and click Edit Disk.

Hyper-V Console - Edit Disk

After clicking Edit Disk, you’ll be presented with a wizard, where you’ll point Hyper-V to the .avhdx file that you want to merge.

IMPORTANT: Select the .avhdx file, and not the .vhdx file, otherwise you won’t see the Merge operation available!

Hyper-V Edit Disk - Locate Virtual Hard Disk

On the next wizard screen, select the Merge action.

Hyper-V Edit Disk - Merge Action

Next, you’ll need to choose the destination for the merge operation. In most cases, you’ll choose the To the parent virtual hard disk option.

Hyper-V Edit Disk - Select Parent

Finally, on the Summary page of the disk editing wizard, just complete the wizard, and it will merge your disks for you. That’s all there is to it!

Hyper-V Edit Disk - Complete Wizard

 

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

As part of our ongoing security focus, we have enabled a new feature within our email security platform from Mimecast.

What will I see?

For a small percentage of links that you click in emails, we will show you a webpage with information about the email you received and the website you are trying to access.

We will ask you to make a decision about whether you are happy to continue to the website, or if you want to change your mind. By prompting you to think before you click, you will help us strengthen our defenses.

 

What do I need to do?

The next time you click a link in an email [delete as needed: or request the release of an original email attachment] you will be asked to enroll in the Mimecast Targeted Threat Protection service in order to continue. You will only be asked to enroll once on each device you use to access your work email (e.g. laptop and mobile).

When prompted in the browser, enter your work email address and click “Next”. We will send you a one time authentication code by email which you will need to enter into your browser where indicated.

If you have any questions or need further help, please contact the IT help desk.

 

 

 

 

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

Create a CSR , I find Digicert Util is the easiest way to do this

https://www.digicert.com/util/

Save the CSR request somewhere on a network available to the SBS server

Run this on the SBS server

certreq.exe -submit -attrib "CertificateTemplate:WebServer" %locationofcsrfiles%\csr.txt

Save to .cer file somewhere then import this into the server via the Digicert Util

Change the IIS Bindings to this nearly imported CERT

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

Shout out to Bennis at Bayswater Electrical for this!

Logpaser is seriously good tool to filter through the mess of IIS logs!

https://www.microsoft.com/en-au/download/details.aspx?id=24659

Grab all your ISS log files for the dates you need.

Chuck them in a directory

First command grabs all the .log files into a single csv

logparser.exe -i:iis “select * into c:\temp\merge.log from c:\temp\logs\*” -o:csv

the “–i” option selects the log format  be sure to select the correct format to match your IIS settings. eg, exchange is generally IISW3C.

 

The second command you use to filter out the details you really need, similar to a sql query!

logparser.exe -i:csv “Select username, date, time, target FROM c:\temp\merge.log TO c:\temp\output.csv WHERE RequestType LIKE ‘%get%’ and username is not null”

Use Excel or Notepad ++ to join the results together

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

Find the current cert location

sudo vi /etc/nginx/nginx.conf

Look for lines

ssl_certificate /etc/pki/nginx/cert.pem;


Go to Digicert and download .pem with All certs

Use WINSCP to copy this to /etc/pki/nginx/and change the config to look at the new PEM file : 

sudo vi /etc/nginx/nginx.conf

Restart Nginx

sudo service nginx restart
VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)