Tag: Microsoft

How to upgrade Veeam Backup Enterprise Manager to v12.1.2.172

Veeam released the Backup & Replication v12.1.2.172 on May 21, 2024.
The vulnerabilities documented in these sections were fixed starting in the 12.1.2.172 build.
Veeam Backup Enterprise Manager (VBEM)
CVE-2024-29849 | Severity: Critical (9.8)
This vulnerability in VBEM allows an unauthenticated attacker to log in to the VBEM web interface as any user.
CVE-2024-29850 | Severity: High (8.8)
This Vulnerability in VBEM allows account takeover via NTLM relay.
CVE-2024-29851 | Severity: High (7.2)
This vulnerability in VBEM allows a high-privileged user to steal the NTLM hash of the VBEM service account if that service account is anything other than the default Local System account.
CVE-2024-29852 | Severity: Low (2.7)
This vulnerability in VBEM allows high-privileged users to read backup session logs.

How to upgrade Veeam Backup and Replication to v12.1.2.172

Veeam released the Backup & Replication v12.1.2.172 on May 21, 2024.
The vulnerabilities documented in these sections were fixed starting in the 12.1.2.172 build.

How to Configure Custom Safe Links Policies in Microsoft Defender for Office 365

Safe Links is a feature in Microsoft Defender for Office 365 (formerly known as Office 365 Advanced Threat Protection or ATP) that helps protect your organization from malicious hyperlinks in email messages. When an email contains a hyperlink, Safe Links checks the URL against a list of known malicious links. If the link is safe, the user can access the website normally. However, if the link is malicious, Safe Links blocks access to the website and alerts the user and administrators.

Migrate Physical Machine to Microsoft Failover Cluster

Let’s walk through the steps to perform a Physical to Virtual machine (P2V) conversion using Veeam Backup and Replication (VBR) to migrate a physical server to a Cluster virtual machine.

How to create custom Safe Attachments policies in Microsoft Defender for Office 365

In Microsoft Defender for Office 365, Safe Attachments is a feature that helps protect your organization from malicious email attachments. It automatically scans email attachments for potential threats, such as malware or viruses, before delivering them to recipients’ mailboxes.

How to create a Custom Quarantine Policy in Microsoft Deferent for Office 365

Creating a custom quarantine policy in Microsoft Defender for Office 365 involves configuring advanced threat protection settings to protect your organization’s email environment.

How to use the Microsoft Defender portal to assign Standard preset security policies to users

Microsoft Defender for Office 365 provides preset security policies to help organizations protect their Office 365 environment from various threats. These preset policies are designed to offer baseline protection and can be customized according to the organization’s specific requirements.

Microsoft Defender for Office 365-Configure trusted ARC sealers email authentication for Microsoft 365 Custom domains

Authenticated Received Chain (ARC) is a mechanism used in email authentication protocols to address the issues of message forwarding and intermediary handling of emails. It is designed to improve the reliability and security of email authentication systems like SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail).

Microsoft Defender for Office 365 – Configure DMARC email authentication for Microsoft 365 Custom Domains

Domain-based Message Authentication, Reporting, and Conformance (DMARC) builds upon SPF and DKIM to give domain owners greater control over how recipient servers handle their email messages. With DMARC, domain owners can specify policies instructing recipient servers on how to handle emails that fail SPF or DKIM checks. DMARC also enables domain owners to receive reports on email authentication results, allowing them to monitor and improve their email security posture.

Microsoft Defender for Office 365 – Configure DKIM email authentication for Microsoft 365 Custom domains

DomainKeys Identified Mail (DKIM) allows email senders to sign their outgoing emails digitally using cryptographic signatures. These signatures are stored as DKIM records in the domain’s DNS settings. Recipients’ mail servers can then use these signatures to verify that the email content has not been tampered with and originated from an authorized sender.

Microsoft Defender for Office 365-Configure SPF email authentication for Microsoft 365 domains

Microsoft Defender for Office 365 is a cloud-based email filtering service that helps protect businesses against advanced threats such as phishing and malware in emails, links, and collaboration tools like Microsoft Teams, SharePoint, and OneDrive. Formerly known as Office 365 Advanced Threat Protection (ATP), Microsoft Defender for Office 365 provides several features to enhance the security posture of an organization’s email and collaboration environment.

Fix VBR 12.1.1 Backup Configuration Warning Failed to connect to Red Hat Virtualization plug-in…

This is a very interesting warning. I migrated many VBR servers, and it’s the first time I’ve encountered this warning.
The detailed warning message is below:
Warning Failed to connect to Red Hat Virtualization plug-in: Failed to login to platform service: The remote certificate is invalid according to the validation procedure.

How to use QNAP as Object Storage for Veeam Backup and Replication 12.1 with Immutability Backup

      Comments Off on How to use QNAP as Object Storage for Veeam Backup and Replication 12.1 with Immutability Backup

QNAP QuObjects application is free and certificated for objects with immutability, which means you can use it as object storage within Veeam for a backup repository that supports their immutability feature.

How to Cutover the Client Access namespace to Exchange 2019

To transition the client access namespace to Exchange Server 2019, change the DNS record for the client access namespace to the Exchange Server 2019 environment.

How to Install Backup for Microsoft 365 v7a

      No Comments on How to Install Backup for Microsoft 365 v7a

Veeam released the version of Veeam Backup for Microsoft 7a on December 5, 2023. The Cumulative patches contain Veeam Backup and replication v12.1 compatibility and the ability to set email notifications with Google and M365 accounts in Veeam Explorers.

How to Install Veeam Backup Enterprise Manager 12.1

Veeam Backup Enterprise Manager is a centralized management and reporting tool designed by Veeam Software for overseeing Veeam Backup & Replication deployments. It allows administrators to control and monitor their backup infrastructure through a web-based interface, making it easier to manage large-scale environments.

How to Install Veeam Backup and Replication Console 12.1

When you install Veeam Backup & Replication v12.1, the Veeam Backup & Replication console 12.1 is automatically installed on the backup server. If you want to remotely access Veeam Backup & Replication v12.1, install the Veeam Backup & Replication console 12.1 on a dedicated machine.

How to Install Veeam Backup and Replication 12.1

When you install Veeam Backup & Replication v12.1, the Veeam Backup & Replication console is automatically installed on the backup server. If you want to access Veeam Backup & Replication remotely, you can install the Veeam Backup & Replication console on a dedicated machine.