-
Role-based Access Control (RBAC)
I would have to say that this topic is probably one of the biggest pet peeves of mine in the Information Technology field. Why do Systems Administrators not use Security Groups correctly (mind you, Microsoft administrators usually)? Why do I go to a site and most often find that permissions are given directly to a…
-
Change the Canonical Name (CN) of an Active Directory User
Clean-up Active Directory periodically to make it uniform and look more professional.
-
PowerShell New-ADUser
Create many new users in the same format and in the correct OU. Save on typing and errors.
-
Ubuntu 18.04 Automatic Zime Zone
While traveling outside of my home time zone, I opened my computer and found that the time was incorrect. This was to be expected because I had yet to connect to the Internet. So naturally, I connected the Wi-Fi, and checked the date and time to see that nothing happened. Hmm, OK. I restarted my…
-
Amazon Web Services
Moved to Amazon Web Services (AWS)! Finishing up some military training, then planning on finishing CompTIA Linux+, then starting an AWS training frenzy!!
-
VMware ESXi 6.5 STIG Default File Permissions
Sorry for the long title, but I wanted it to be descriptive enough to understand and search. So recently, I was testing out the VMware Fling, “DoD Security Technical Implementation Guide(STIG) ESXi VIB” to try to speed up how I secure my hosts. Unfortunately, it changed the default file permissions on my files and I…