Category: Cyber Security

Microsoft Defender for Office 365 – Configure DKIM email authentication for Microsoft 365 Custom domains

DomainKeys Identified Mail (DKIM) allows email senders to sign their outgoing emails digitally using cryptographic signatures. These signatures are stored as DKIM records in the domain’s DNS settings. Recipients’ mail servers can then use these signatures to verify that the email content has not been tampered with and originated from an authorized sender.

Microsoft Defender for Office 365-Configure SPF email authentication for Microsoft 365 domains

Microsoft Defender for Office 365 is a cloud-based email filtering service that helps protect businesses against advanced threats such as phishing and malware in emails, links, and collaboration tools like Microsoft Teams, SharePoint, and OneDrive. Formerly known as Office 365 Advanced Threat Protection (ATP), Microsoft Defender for Office 365 provides several features to enhance the security posture of an organization’s email and collaboration environment.

CVE-2024-20253 Cisco Unified Communications Products Remote Code Execution Vulnerability

A flaw in some Cisco Unified Communications and Contact Center Solutions products could allow an unauthenticated, remote attacker to run arbitrary code on a vulnerable device.
If your customers use the products below, Please update the software ASAP.

How to use QNAP as Object Storage for Veeam Backup and Replication 12.1 with Immutability Backup

      Comments Off on How to use QNAP as Object Storage for Veeam Backup and Replication 12.1 with Immutability Backup

QNAP QuObjects application is free and certificated for objects with immutability, which means you can use it as object storage within Veeam for a backup repository that supports their immutability feature.

How to configure Multi-Factor Authentication for Users at Veeam Backup and Replication v12

Multi-factor authentication (MFA) is supported by Veeam Backup & Replication for additional user verification. A one-time password (OTP) generated in the mobile authenticator application is a secondary verification method. With login and password credentials, it creates a more secure environment and keeps user accounts safe.

How to Add Linux Server for a hardened repository to Veeam Backup and Replication v12

Suppose you plan to use backup infrastructure components and servers that you plan to use for various types of restore operations. In that case, you must add the Linux servers to the backup infrastructure.