Archive
Free complete guide to data protection
Having a reliable and secure backup and disaster recovery strategy could be the most important thing you do.
I’m sure you’ve heard many data loss horror stories that have crippled organizations costing thousands, if not millions, of dollars. This free eBook from Altaro will make sure you’re not the next horror story victim.

The Backup Bible Complete Edition, written by backup expert and Microsoft MVP Eric Siron, is comprised of 200+ pages of actionable content divided into 3 core parts, including 11 customizable templates enabling you to create your own personalized backup strategy.
Part 1 and 2 are updated versions of previously released eBooks (Creating a Backup & Disaster Recovery Strategy and Backup Best Practices in Action) but Part 3 is a brand-new section on disaster recovery (Disaster Recovery & Business Continuity Blueprint) that includes tons of valuable insights into the process of gathering organizational information required to build a DR plan and how to carry it out in practical terms.
One of the most useful features of The Backup Bible is the customizable templates and lists that enable the reader to put the theory into practice. These are found in the appendix but are linked in the text at the end of each relevant chapter. If you are going to read this book cover to cover it would be a good idea to fill out the templates and lists as you go through it, so by the time you’ve finished reading you’ll have a fully personalized backup action plan ready for you to carry out!
The Backup Bible Complete Edition also works as a great reference guide for all IT admins and anyone with an interest in protecting organizational data. And the best thing of all: it’s free!
A Voucher for you and a donation for those in need
‘Tis the season to be caring – caring for your loved ones, for each other, and yes, even your data and mailboxes. The arrival of the Holiday Season is a great time to recognize all the challenges we’ve survived this year, to be thankful for all we have and to share.
Let’s Celebrate: All you have to do is sign up for a 30-day free trial of either Altaro VM Backup or Altaro Office 365 Backup – it’s your choice!

How does it work?
· Trial Altaro VM Backup or Altaro Office 365 Backup
· Get a guaranteed $10 Amazon voucher & a chance to win one of the Grand Prizes
· Altaro will make a $10 donation to One Laptop per Child for every valid entry What are you waiting for? Sign up now!
Notes for deploying Acronis Virtual Firewall

Components:
You can use either the setup application which will install all components or use MSI installer packages for unattended installations:
- Management Service: installed on the host(s) or designated VM(s) that will be set as Management Server for the entire Windows Server/HyperV environment. (Note: multiple management servers could be deployed to provide disaster recovery function)
- Virtual Router Management Service: installed on Virtual Router.
- Management Console: installed on each host/VM that will be used by administrators to operate and control the system security/compliance rules application
Firewall Rules
(if deploying in Azure, make configure the NSG rules) :

Management Server | Firewall rules |
from virtual router | • TCP 8939 – 5nine.Antivirus.UpdateService endpoint • TCP 8534 – Antivirus (AV) management endpoint • TCP 8790 – vFirewall management endpoint • TCP 8939 – IDS update service endpoint • TCP 8183 – For signature updates of Snort Intrusion Detection System (IDS) |
from Management Console | • TCP 8789 – Client |
to SQL Server Database | TCP 1433 (default) or other port defined in SQL configuration |
to internet | • TCP 80 – Snort IDS / AV update over HTTP |
to DHCP server (if applicable) | • UDP 68 |
Outbound to DNS server | • UDP 53 |
to Syslog Server (if applicable) | • UDP 514 |
to additional Cloud Security Management Services (if applicable) | • TCP 8790 |
to Virtual Router | • TCP 8533 • TCP 8788 |
Virtual Router | Firewall rules |
from management server | • TCP 8533 – AV management • TCP 8788 – vFirewall management |
from Azure VMs | • TCP 8489 – AP agent communication • TCP 3187, TCP 8943 – AP agent update service communication. |
to management server | • TCP 8534 – Antivirus (AV) management endpoint • TCP port 8183 – For Cisco Snort Intrusion Detection System (IDS) • TCP 8790 – vFirewall management endpoint |
to internet | TCP 80 – AV update over HTTP |
to Azure VMs | TCP 8287 – AP management endpoint |
Azure Virtual Machines | Firewall rules |
to virtual router | • TCP 8489 – AP agent communication endpoint • TCP 3187, TCP 8943 – AP agent update service |
from virtual router | • TCP 8287 – AP management endpoint |
Management Console | Firewall rules |
to management server | • TCP 8789 – Client |
Configuration for High Availability
For HA scenarios, you will need to install a separate instance of Management Service onto each server in the windows failover cluster pair, pointing to the same data source (SQL server). SQL server may also be set for high availability. From this point you will have to use cluster failover role IP address/FQDN instead of a standalone IP address/FQDN as a management service address when you need to connect to the management service.
When configuring high availability in the failover clustering, you will have to select the Generic Service option for Cloud Security Management Service and proceed with setup in a standard way.
Silent Install from MSI Packages
To install Cloud Security components silently from the command line, run the Setup Launcher Application and copy the MSI package files to c:\Setup or to another location as once the launcher application is closed the directory and contents will be deleted.
Example – Setup Router Service:
msiexec /i RouterServiceSetup.msi /qn /norestart /l* info.log
MANAGEMENT_SERVER=[Cloud Security FQDN name]
WINLOGIN=[DOMAIN\Administrator] WINPASS=[Password]
Note: To install the management console on the server where multiple users with different privileges work, the best practice is to select the option Use default credentials so that each time the management console is started the necessary privileges are granted on it. The same applies to tenants’ setup, the user that is currently running the management console instance must match the user, set to connect to the management service in order to get the right privileges. Refer to the Global Administrator and Tenants section

Adding Microsoft Azure Tenant Account
The main thing to do before starting anything with 5nine Cloud Security is to add Microsoft Azure Tenant Account. Click on Azure Connection Settings dialog by selecting Settings – Add Azure Tenant main menu option.
Global Administrator and Tenants
The User Management feature is designed to set permissions on 5nine Cloud Security objects (virtual machines) and operations performed through the management console.
It is crucial to set them appropriately. These permissions are unrelated to users’ permissions that are set in Windows or Active Directory (AD); they apply users’ rights solely for Cloud Security objects and operations.
The most important users that have to be created (added) in User Management are Global Users, particularly Global Administrator. This user will be able to see all the virtual machines that are managed by Cloud Security and to perform all the operations through the management console: set global rules, create/delete tenants , operate the antivirus feature and set permissions for other users.
Note: Before the Global Administrator is created, there are no permissions set and any user operating management console is considered as Global Administrator.
SysAdmin Horror Stories
We all know that a SysAdmin’s job is no easy task, and apart from constantly having systems to update, bugs to fix and users to please, SysAdmins encounter all sorts of situations throughout their careers. From tech situations to funny anecdotes, terrible mishaps or incidents with colleagues, this eBook includes real stories of what SysAdmins go through on a daily basis.

It’s very easy to download as no registration is required. Click on Download and it’s yours. It includes more than 20 short stories but this one is my personal favourite 😊.
Azure Sentinel with built-in behavioural analytics powered by UEBA platform
This latest innovation helps identify anomalies and extract behavioural insights for threat hunting and detection. Insights are aggregated across multiple data sources to provide a unified host or user profile.
Other innovations include:
- Integration with Azure Machine Learning Jupyter notebooks which offers a framework and cloud-scale data pipeline for ML using Azure Databricks.
- Ability to search, add and track threat indicators, and create watchlists for threat hunting and detection (e.g., restricted IPs, trusted systems, critical assets, risky users, vulnerable hosts).
- New data connectors, including for Microsoft Teams, Microsoft 365, and other clouds and data collection pipelines.
Celebrating SysAdmin day
Despite all challenges thrown our way this year, the hard work of SysAdmin made it possible for all of us to keep going, so Altaro are taking this opportunity to thank you:
If you are an Office 365, Hyper-V or VMware user, sign up for a 30-day free trial of either Altaro VM Backup or Altaro Office 365 Backup and receive a €/£/$20 Amazon voucher when you use your trial of Altaro Office 365 Backup or Altaro VM Backup.
Plus, get the chance to also win one of their Grand Prizes by sharing your greatest 2020 victory with Altaro in an up to 60-seconds video.
What are you waiting for? Sign up now!

Monitoring AKS Windows node pools
Monitoring your containers is critical, especially when you’re running a production cluster, at scale, with multiple applications. Currently in Preview, the Azure Monitor for Containers will automatically start to collect logs (std/stderr) on the containers running on Azure Kubernetes Service (AKS)
This will provide you end-to-end monitoring on AKS Windows node pools with logs and metrics (which is already supported).

With Azure Monitor for containers you can:
- Identify AKS containers that are running on the node and their average processor and memory utilization. This knowledge can help you identify resource bottlenecks.
- Identify processor and memory utilization of container groups and their containers hosted in Azure Container Instances.
- Identify where the container resides in a controller or a pod. This knowledge can help you view the controller’s or pod’s overall performance.
- Review the resource utilization of workloads running on the host that are unrelated to the standard processes that support the pod.
- Understand the behavior of the cluster under average and heaviest loads. This knowledge can help you identify capacity needs and determine the maximum load that the cluster can sustain.
- Configure alerts to proactively notify you or record it when CPU and memory utilization on nodes or containers exceed your thresholds, or when a health state change occurs in the cluster at the infrastructure or nodes health rollup.
- Integrate with Prometheus to view application and workload metrics it collects from nodes and Kubernetes using queries to create custom alerts, dashboards, and detailed perform detailed analysis.
- Monitor container workloads deployed to AKS Engine on-premises and AKS Engine on Azure Stack.
- Monitor container workloads deployed to Azure Red Hat OpenShift.
Fore more information see: https://docs.microsoft.com/en-us/azure/azure-monitor/insights/container-insights-overview
Becoming a Azure Sentinel expert
I have been working on Azure Sentinel projects for the past 12 months and writing IP which uses Azure Sentinel, a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution.

Recently, while working on a Sentinel project for a major enterprise I became aware of a training that Ofer Shezaf from Microsoft has shared and I highly recommend for those who would like to learn and become an expert on Azure Sentinel to check out the the material and curriculum.
The training program includes 16 modules and includes presentations, relevant product documentation, blog posts, and other resources and if you are already familiar with Sentinel, check out the module 9, my preferred one.
Overview
– Module 1: Technical overview
– Module 2: Azure Sentinel role
Designing Your Deployment
– Module 3: Cloud architecture and multi-workspace/tenant support
– Module 4: Collecting events
– Module 5: Log Management
– Module 6: Integrating threat intelligence
Creating Content
– Module 7: Kusto Query Language (KQL) – the starting point
– Module 8: Writing rules to implement detection
– Module 9: Creating playbooks to implement SOAR
– Module 10: Creating workbooks to implement dashboards and apps
– Module 11: Implementing use cases
Security Operations
– Module 12: A day in a SOC analyst’s life, incident management, and investigation
– Module 13: Hunting
Advanced Topics
– Module 14: Automating and integrating
– Module 15: Roadmap – since it requires an NDA, contact your Microsoft contact for details.
– Module 16: Where to go next?
You can find the training material here
Image sources: Source image: https://docs.microsoft.com/en-us/azure/sentinel/overview
Celebrate World Backup Day
Contest entries will be accepted until 22 April, 2020
If you manage your company’s Office 365 data, celebrate this World Backup Day with Altaro. All you have to do is sign up for a 30-day free trial of Altaro Office 365 Backup. If you share your biggest backup mishap with them, you get a chance to WIN one of the Grand Prizes:
· DJI Mavic Mini Drone FlyCam Quadcopter,
· Google Stadia Premiere Edition,
· Ubiquity UniFi Dream Machine
· Logitech MX Master 3 Advanced Wireless Mouse.
And guess what? For any Altaro eligible subscription they give you a guaranteed Amazon voucher! What are you waiting for? Sign up now!
Good luck & happy World Backup Day!

Setting up and maintaining a high-performing Azure IaaS environments
Many system administrators have been working with on-premises infrastructure for their whole careers so moving to a cloud-based environment can feel like a leap of faith. However, making the leap to Azure doesn’t have to be daunting. With the right preparation it can be a smooth transition, consistent with your current on-premises configuration.

This free eBook written by veteran IT consultant and Microsoft Certified trainer Paul Schnakenberg covers all aspects of setting up and maintaining a high-performing Azure IaaS environment. It starts from the very basics, introducing key terms and features you need to get started, including migration, and goes on to explain everyday maintenance and best practices before covering more advanced features.
To get the best results from this eBook, it is recommended to follow along with the step-by-step tutorials using your own Azure subscription.
If you don’t currently have access, the eBook explains how to set up a free 30-day trial alongside $200 worth of Azure resources to use and 12 months of additional free resources!