Managing Windows Server with Puppet Part 3: Edit the Site Manifest

In today’s Ask the Admin, Russell Smith shows you to install modules on your Puppet master and how to open and edit the main site manifest using Secure Shell.

The post Managing Windows Server with Puppet Part 3: Edit the Site Manifest appeared first on Petri.

Continue reading Managing Windows Server with Puppet Part 3: Edit the Site Manifest

Package Management in Windows Using Chocolatey

In today’s Ask the Admin, Russell Smith looks at the Chocolatey package manager for Windows, what it does, and how it can simplify software deployment on servers and end-user devices.

The post Package Management in Windows Using Chocolatey appeared first on Petri.

Continue reading Package Management in Windows Using Chocolatey

Managing Windows Server with Puppet Part 2: Log Into Puppet Master, Accept Node Certificate, and Test Connectivity

In today’s Ask the Admin, Russell Smith shows you how to log in to Puppet master using Secure Shell, accept the certificate from the Windows Server node, and how to test connectivity between agent and master.

The post Managing Windows Server with Puppet Part 2: Log Into Puppet Master, Accept Node Certificate, and Test Connectivity appeared first on Petri.

Continue reading Managing Windows Server with Puppet Part 2: Log Into Puppet Master, Accept Node Certificate, and Test Connectivity

Managing Windows Server with Puppet Part 1: Configure Puppet Master and Bootstrap the Puppet Agent in Windows Server

Microsoft Windows Secure Boot

In today’s Ask the Admin, Russell Smith shows you how to set up Puppet Enterprise Master in Azure and provision Windows Server so that it bootstraps with the Puppet agent installed.

The post Managing Windows Server with Puppet Part 1: Configure Puppet Master and Bootstrap the Puppet Agent in Windows Server appeared first on Petri.

Continue reading Managing Windows Server with Puppet Part 1: Configure Puppet Master and Bootstrap the Puppet Agent in Windows Server

PowerShell DSC and Puppet — Why It Is Not Either/Or

In this Ask the Admin, Russell Smith discusses why Puppet and DSC together is often the best configuration management solution in mixed Windows/Linux environments.

The post PowerShell DSC and Puppet — Why It Is Not Either/Or appeared first on Petri.

Continue reading PowerShell DSC and Puppet — Why It Is Not Either/Or

Google Groups misconfiguration leads to sensitive data leaks

If your employees are using Google Groups to discuss issues and ideas, you might want to check whether the sharing setting for these groups is set to “Private”. According to RedLock researchers, many companies fail to do so, most probably by accident, and end up exposing messages containing sensitive information on the internet. By searching for publicly exposed Google Groups within the top 1,000 most visited websites on Alexa, the researchers found hundreds of them, … More Continue reading Google Groups misconfiguration leads to sensitive data leaks

Deception security doesn’t have to be onerous or expensive

When talking about deception security, most infosec pros’ mind turns to honeypots and decoy systems – additional solutions that companies have to buy, deploy, and manage. But there are other ways to use deception to thwart attackers, and they do not require additional tools, pricy subscriptions, or the hiring of additional employees. Free and (nearly) effortless deception security Dr. Pedram Hayati, a partner in IT security services firm Elttam who has been conducting research in … More Continue reading Deception security doesn’t have to be onerous or expensive

Introduction to Microsoft Intune

computer-tablet-hero-img

Part of Microsoft’s Enterprise Mobility + Security solution, Intune handles the task of managing PCs and mobile devices, such as Windows 10 tablets, Android phones and Apple iPads. Get an overview of this Mobile Device Management (MDM) solution.

The post Introduction to Microsoft Intune appeared first on Petri.

Continue reading Introduction to Microsoft Intune

Components of an effective vulnerability management process

Vulnerabilities continue to grab headlines. Whether it is a zero-day that affects “tens of millions” servers around the globe or an old unpatched flaw that leads to a data compromise, we will keep reading about them. The modern security landscape demands a process to manage and keep on the top of the ever-evolving threats and vulnerabilities. This process is known as a vulnerability management program and it is designed to identify, classify and proactively prevent … More Continue reading Components of an effective vulnerability management process

TP-LINK loses control of two device configuration domains

Security researcher Amitay Dan warns that tplinklogin.net, a domain through which TP-LINK router owners can configure their devices, is no longer owned by the company, and that this fact could be misused by malware peddlers. What’s the problem? In a post on the Bugtraq mailing list, Dan says that TP-LINK has confirmed that they no longer own the domain in question, and will not be trying to buy it from the unknown seller for now. … More Continue reading TP-LINK loses control of two device configuration domains