Every system administrator security protocols are different. Some may lack of it and some may secure their server completely.
Most common practice are do a chroot (files and folders permissions) on most services, disable useless services, keep the services up to date,
Also important is CSF firewall along with its configuration for security and triggered based alerts.
One of the other normal practice is by changing the SSH port. Some people might say it does not work anymore these days but it do actually helps a massive amount to keep the script kiddies away. It might reduce the automated hacking and scanning attempts which is significant if you think about it because i think its 60% of the attacks that are automated.
» Read more
This July 26th will be the system admin appreciation day. It is an international celebration of sysadmins across the globe, an official recognition of geekdom and of the time and effort these device-doctors and tech-therapists sacrifice as they work their magic at unsocial hours.
Consider all the daunting tasks and long hours (weekends too.) Let’s be honest, sometimes we don’t know our System Administrators as well as they know us. Remember this is one day to recognize your System Administrator for their workplace contributions and to promote professional excellence. Thank them for all the things they do for you and your business.
Get this error when I tried to access one of the shared folders in my network. I was running on a newly installed Windows 10 Enterprise. Made a quick google on the error as I was very sure it must has something to do with the OS’s policy. And yes it was.
So the next thing to do is open the Local Group Policy Editor by typing gpedit.msc at the Run window.
Navigate to Computer Configuration -> Administrative Templates -> Network -> Lanman Workstation and select the Enable insecure guest logons.
By default it was not configured or disabled. Click enable.
And now try to access it again. Good luck.
When you are owning a server, a virtual private server or a dedicated server, you sure would want to know the availability of the server on the internet and how long it has been running.
One of the command to check this is called uptime. This command only works on unix or linux operating system.
To display the system uptime, invoke the command without any options ::
The output will show something like this :
22:20:33 up 620 days, 22:37, 1 user, load average: 0.03, 0.10, 0.10
22:20:33 is the current system time.
up 620 days, 22:37 is the length of time the system has been up.
1 user is the number of logged in users.
load average: 0.03, 0.10, 0.10 are system load averages for the past 1, 5, and 15 minutes.
The load average on Linux can be a little confusing. Unlike other operating systems that shows CPU load averages, Linux is showing system load averages.
» Read more
If your company has moved to Office 365 as a hosted email solution, your email is being hosted in a Microsoft Data Centre and most likely being filtered using Microsofts Exchange Online Protection (EOP). Although the Office 365 spam filter offers a
reasonable level of security, some businesses find it basic and lacking when it comes highly-sophisticated cyber threats especially advanced and persistent spear phishing attacks.
With this approach, security is not dependent on any single layer, especially in the event of an attack. Office 365 offers 2 levels of email security, “Exchange Online Protection” and “Advanced Threat Protection” for a protection level in the low-middle of the market, according to an SE Labs study, “Email-hosted protection” published in August 2017. As email security experts with over 20 years’ experience, we know new malware can penetrate the usual email filtering mechanisms. It has long been the case that older email protection technologies, like analysis reputation and fingerprinting, are no longer effective against the evolution of these threats.
More details at https://www.titanhq.com/protecting-office365-from-attack