Disable Fortigate Identity on WAN port (that is enabled by default):
https://community.fortinet.com/t5/FortiGate/Technical-Tip-Closing-TCP-port-113/ta-p/195373
config system interface
edit
set ident-accept enable
next
end
https://community.fortinet.com/t5/FortiGate/Technical-Tip-Closing-TCP-port-113/ta-p/195373
config system interface
edit
set ident-accept enable
next
end
nslookup myip.opendns.com. resolver1.opendns.com
https://helpcenter.itopia.com/en/articles/4859965-restricting-application-access-using-applocker
https://adamtheautomator.com/windows-10-applocker/
https://www.grouppolicy.biz/2010/08/how-to-use-group-policy-to-control-services/
Probably Application Identity service is not started. Configure Application Identity service startup in GPO:
Computer Configuration > Policies > Windows Settings > Security Settings > System Services > Application Identity
Check this settings applied correctly:
gpresult /h DISK:\GPRESULT.html
It is possible to configure startup of this service on every machine, but it is a waste of s time:
sc config "AppIDSvc" start=auto & net start "AppIDSvc"
https://www.zdnet.com/article/what-is-immutable-linux-heres-why-youd-run-an-immutable-linux-distro/
https://interface31.ru/tech_it/2024/10/nvme-over-tcp—prakticheskoe-znakomstvo-s-tehnologiey.html
Shut down all VMs and PCs that might use shared on this server data.
On the old server:
Get and save information about all local accounts:
wmic useraccount get name,sid > D:\old-SIDs.txt
Get and save all permissions in selected folder:
icacls "D:\Data" /save D:\Data-icacls.txt /t /c
On the new server:
Configure new accounts
Get and save information about all local accounts:
wmic useraccount get name,sid > D:\new-SIDs.txt
On your PC:
Replace old SIDs with the new SIDs in ICACLS dump files (copy original dump files first)
On the new server:
Attach disk D: from an old server to the new one
Configure System to own D:
Allow admin to access D: (“This folder only” type)
Restore permissions from icacls dump:
icacls R:\ /restore D:\Data-icacls.txt
for %%G in (“C:\Program Files (x86)\Test Folder\*.exe”) do (
netsh advfirewall firewall add rule name=”Blocked With Batchfile %%G” dir=in action=block program=”%%G” enable=yes profile=any
netsh advfirewall firewall add rule name=”Blocked With Batchfile %%G” dir=out action=block program=”%%G” enable=yes profile=any
)
https://komodor.com/learn/kubectl-autocomplete-enabling-and-using-in-bash-zsh-and-powershell/
https://stackoverflow.com/a/77694825
apt-get install bash-completion -y
echo ‘source /etc/bash_completion’ >>~/.bashrc
echo ‘source <(kubectl completion bash)’ >>~/.bashrc
source ~/.bashrc
https://operavps.com/docs/install-nfs-server/
nano /etc/systemd/system/minikube.service
[Unit]
Description=minikube service autostart
After=docker.service
[Service]
Type=oneshot
ExecStart=/usr/local/bin/minikube –force –driver=docker start
RemainAfterExit=true
ExecStop=/usr/local/bin/minikube stop
StandardOutput=journal
User=root
Group=
[Install]
WantedBy=multi-user.target
systemctl daemon-reload
systemctl enable minikube
reboot
Phase 1 & 2 encryption algorhithms supported in popular Operating Systems:
https://wiki.mikrotik.com/wiki/Manual:IP/IPsec#Windows_client_configuration
Create Ipsec connection in Windows with usage of more secure encryption algorhithms:
https://forum.netgate.com/topic/150670/safe-ikev2-configuration-for-pfsense-and-windows-10-and-macos
https://247-it.io/en/ansible-installation-configuration-and-use-with-windows-and-linux/
https://247-it.io/en/ansible-organize-your-hosts-in-an-inventory-file-in-yaml-format/
Which GUI management tools should you recommend?
https://www.reddit.com/r/ansible/comments/pejmkm/which_gui_management_tools_should_you_recommend/?rdt=40820