Requirements Collection Thoughts

The collection of user requirements can be a difficult and time-consuming process, working towards Agile principles the collection of requirements should be a collaborative process helping the requestor (customer/colleague) to discover what they want through requirements collection sessions to build a document that contains the necessary information for the design teams to build a solution […]

More...

Exchange 2016 – Security Update For Exchange Server 2016 CU22 (KB5015322) – OWA Failed After Update

After an update Microsoft Exchange 2016 – Security Update For Exchange Server 2016 CU22 (KB5015322), following the upgrade the following appeared: The Exchange server appeared to operating fine, mail flow was fine, the DAG operating as expected, users who are using ActiveSync, Exchange Anywhere or EWS all appeared to have no problems. However using OWA […]

More...

Extreme Networks VOSS Switch – SNMP(v3) Configuration and Monitoring Configuration

Moniting with SNMPv3 is much like monitoring with SNMPv2 or 1 for that matter, except SNMPv3 offers greater security options. SNMPv1 or v2 offers very little security being based on a plain text community string, of course on the monitored device you can restrict which hosts are allowed to connect to your monitored device via […]

More...

Testing iSCSI Connectivity from VMware ESXi to Storage

If you wish to test the connectivity through from your VMware ESXi host through to its storage when using iSCSI you can perform steps such as the following described within: https://kb.vmware.com/s/article/1003728 Firstly run this to get your list of vmKernel ports: Assuming you’ve labelled the vmKernel ports you use for iSCSI with something sensible you […]

More...

VMware Distributed Virtual Switch Version Upgrade via Side-by-Side Migration (vSwitch 6.0.0 to 6.5.0 or 6.6.0)

VMware have recommended that upgrading from Distributed vSwitch version: 6.0.0 to 6.5.0 or 6.6.0 should be done as a side by side migration rather than an in place upgrade due to the risk of outage when performing the upgrade in place, this is detailed in the following VMware article: https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.networking.doc/GUID-330A0689-574A-4589-9462-14CA03F3F2F4.html. It is understood that vDS […]

More...

Separation of Duties, Two-Person Control, (Principle of) Least Privilege and Need to Know

Information Security has a number of foundational concepts, such as the Confidentiality, Integrity and Availability of information, information assets and services. In this article we’ll explore four key concepts that are good to understand to assist you in building and configuring secure systems and therefore protecting and improving the Confidentiality, Integrity and Availability of your […]

More...

AWS with Python3 using Boto3 Quickstart (Linux)

Following on from the https://www.geekmungus.co.uk/aws-cli-quick-start-linux guide, let’s see about how you can connect to your AWS from Python3 using Boto3. If you’ve not already done it, and if you’re not using the “default” credentials, you can specify a particular profile to use by adding it to an environment variable for example the below; where the […]

More...