-
Notifications
You must be signed in to change notification settings - Fork 0
/
index.xml
executable file
·454 lines (376 loc) · 31.9 KB
/
index.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Home on Website of Clint McGuire</title>
<link>https://www.clintmcguire.com/</link>
<description>Recent content in Home on Website of Clint McGuire</description>
<generator>Hugo -- gohugo.io</generator>
<language>en-us</language>
<copyright>&copy; Clint McGuire 2009-2023</copyright>
<lastBuildDate>Tue, 15 Aug 2023 07:49:25 -0700</lastBuildDate><atom:link href="https://www.clintmcguire.com/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>How I Work with Obsidian</title>
<link>https://www.clintmcguire.com/blog/how-i-work-with-obsidian/</link>
<pubDate>Tue, 15 Aug 2023 07:49:25 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/how-i-work-with-obsidian/</guid>
<description>How it all began As I mentioned here, I&rsquo;ve tried many different productivity tools for keeping myself organized at work but I&rsquo;ve settled on Obsidian.
It was going to be a demo for a co-worker.
I started very simple, a note for each day, using the Daily Note plugin - no template, just a blank space where I put the various projects names and a line or two about status. I probably had the Calendar plugin installed - because it makes it easier to work with the Daily Note and I like having the calendar on the screen.</description>
</item>
<item>
<title>How I Study with Obsidian</title>
<link>https://www.clintmcguire.com/blog/how-i-study-with-obsidian/</link>
<pubDate>Fri, 11 Aug 2023 07:56:21 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/how-i-study-with-obsidian/</guid>
<description>As I mentioned here, I use Obsidian to prepare for tests.
I have a simple process for preparing:
Exam Prep note Find study material sources Create Topic Notes Gather data into Topic Notes Make content my own Turn Topic Notes into slides Review slides Take practice tests Add content to address weaknesses New notes specific to a part of the content/category Repeat steps 4, 5 &amp; 6 Take exam Consistency This process has worked for me - I’ve passed 100% of the tests I taken using this method, on my first attempt.</description>
</item>
<item>
<title>Obsidian</title>
<link>https://www.clintmcguire.com/blog/how-i-use-obsidian/</link>
<pubDate>Thu, 03 Aug 2023 07:48:22 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/how-i-use-obsidian/</guid>
<description>Background I have been using Obsidian since 2021 to take notes and keep myself organized. Over that time, my use of Obsidian has expanded and now it is critical to my daily workflow, for my work, my personal and professional development and my physical and mental health.
Obsidian allows me to keep technical notes, study for test and organize my thoughts.
Obsidian helps me track my personal goals and development.</description>
</item>
<item>
<title>Azure Security Engineer Associate</title>
<link>https://www.clintmcguire.com/blog/azuresecurityengineerassociate/</link>
<pubDate>Fri, 14 Jul 2023 21:34:32 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/azuresecurityengineerassociate/</guid>
<description>After a few months of preparation and practice exams, I&rsquo;m happy to report that I&rsquo;ve passed the AZ-500 Exam.
https://learn.microsoft.com/api/credentials/share/en-ca/ClintMcGuire-6169/8D1573250504B569?sharingId=6505D259B91DCAD7</description>
</item>
<item>
<title>NSE7</title>
<link>https://www.clintmcguire.com/blog/nse7/</link>
<pubDate>Fri, 26 May 2023 21:32:50 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/nse7/</guid>
<description>After a couple months of studying, I&rsquo;m happy to report that I&rsquo;ve passed Fortinet&rsquo;s NSE7 SD-WAN test, renewing my NSE certifications.
I hold the following certifications from Fortinet:
Network Security Professional - NSE4
Network Security Analyst - NSE5
Network Security Architect - NSE7</description>
</item>
<item>
<title>CISSP</title>
<link>https://www.clintmcguire.com/blog/cissp/</link>
<pubDate>Sun, 16 Apr 2023 07:55:07 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/cissp/</guid>
<description>After many months of study and preparation, I can happily say that I&rsquo;ve been awarded the CISSP designation.
https://www.credly.com/badges/f31a048f-61fa-4e40-8575-7a763b535227/public_url</description>
</item>
<item>
<title>Azure Solution Architect</title>
<link>https://www.clintmcguire.com/blog/azuresolutionarchitect/</link>
<pubDate>Sun, 13 Mar 2022 10:43:05 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/azuresolutionarchitect/</guid>
<description>Azure Certifications My plan for this year is to get 3 Azure certificates. The first one on the list was the Azure Solution Architect Expert. I already hold the Azure Fundamentals - AZ-104 - certification, so I only needed to complete the AZ-305 exam to get this cert.
This cert also tests against broad knowledge of many different parts of Azure, so going deep into any one area was not required.</description>
</item>
<item>
<title>Five Tips to Secure M365 Business Standard</title>
<link>https://www.clintmcguire.com/blog/five-tips-to-secure-m365-business-standard/</link>
<pubDate>Mon, 21 Feb 2022 21:10:28 -0800</pubDate>
<guid>https://www.clintmcguire.com/blog/five-tips-to-secure-m365-business-standard/</guid>
<description>How to improve security in M365 Microsoft has added a lot of security features to the M365 platform, but not all of them are available to all license levels. If you are licensed for M365 Business Standard you won&rsquo;t have access to all the security features in the platform, so let&rsquo;s focus on what is available to your tenant and review the Top 5.
Setup multi-factor authentication for all users Create dedicated admin accounts Filter out commonly malicious attachments from email Use mail flow rules to warn users about potentially dangerous attachments Use mail flow rules to prevent auto-forwarding of email How do these improve security?</description>
</item>
<item>
<title>BEC</title>
<link>https://www.clintmcguire.com/blog/bec/</link>
<pubDate>Fri, 04 Feb 2022 07:44:38 -0800</pubDate>
<guid>https://www.clintmcguire.com/blog/bec/</guid>
<description>What is the Risk? The risk is high.
The Verizon 2021 Data Breach Investigations Report lays out the statistics quite clearly. Comparing the three types of attacks - Business Email Compromise (BEC), Computer Data Breach (CDB) &ldquo;Hacking&rdquo; and Ransomware - there were 7 times the number of incidents of BEC. [BEC = 19,000; CDB = 2,780; Ransomware = 2,480]
While not all incidents ended with the victim losing money, BEC came in number one here again - having the most incidents leading to a loss.</description>
</item>
<item>
<title>Existential Cash Flow Crisis of Ransomware</title>
<link>https://www.clintmcguire.com/blog/existential-cash-flow-crisis-of-ransomware/</link>
<pubDate>Mon, 06 Dec 2021 08:03:00 -0800</pubDate>
<guid>https://www.clintmcguire.com/blog/existential-cash-flow-crisis-of-ransomware/</guid>
<description>Ransomware has evolved into a model known as Double Extortion. Before encrypting your data and holding it ransom, the criminals copy the data off your computers to their own, where they keep it as a hostage. If you choose to not pay the ransom they will expose the hostage copy of your data publicly on the internet. They use reputation risk and confidentiality requirements (either regulation or contractual) as a way to force the payment.</description>
</item>
<item>
<title>FortiSwitch VLANs</title>
<link>https://www.clintmcguire.com/blog/fortiswitch-vlans/</link>
<pubDate>Wed, 03 Nov 2021 07:35:48 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/fortiswitch-vlans/</guid>
<description>In the FortiSwitch Management, for Ports and Trunks, it shows Native VLAN and Allowed VLANs. This was new terminology for me. Other switches I&rsquo;ve used in the past have had either Tagged or Untagged.
If you look in the CLI, you can also assign an Untagged VLAN to ports&hellip;
How do you modify the VLANs in the GUI? Quick note, to change the VLAN in the GUI, find the port, put your mouse over the table cell for the port and VLAN type you want to change, then click the Pencil icon that will show up in the top right of the cell.</description>
</item>
<item>
<title>Security Baseline</title>
<link>https://www.clintmcguire.com/blog/securitybaseline/</link>
<pubDate>Mon, 11 Oct 2021 07:47:36 -0600</pubDate>
<guid>https://www.clintmcguire.com/blog/securitybaseline/</guid>
<description>Background In Heavy Strategy EP. 010 - Budgeting for Cybersecurity Greg Ferro &amp; Johna Till Johnson agree that &ldquo;Detection is better than Prevention&rdquo;, in that same episode Greg said that he recommended SDP (Software-Defined Perimeter), Asset Inventory and EPP (Endpoint Protection Platform) for all devices.
SDP, Asset Inventory and EPP are protection technologies, so this could be seen as conflicting with &ldquo;detection is better&hellip;&rdquo;. However, I think what Greg is getting at is that there needs to be a minimum level of protection and that further spending on additional protection technologies is likely to be wasteful.</description>
</item>
<item>
<title>Setup MCLAG Trunks between FortiSwitch and VMware</title>
<link>https://www.clintmcguire.com/blog/fortiswitch-mclag-vmware/</link>
<pubDate>Mon, 06 Sep 2021 17:43:40 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/fortiswitch-mclag-vmware/</guid>
<description>If you have MCLAG setup on FortiSwitches, you can setup static Trunks to the ESXi hosts for redundant connections.
I&rsquo;ve used this with FortiOS 6.2 and 6.4 with VMware 6.7. I&rsquo;ve only attempted this with FortiGate Managed FortiSwitch, I believe - but can&rsquo;t confirm - that this is a requirement. (I&rsquo;m pretty sure MCLAG only works when the FortiSwitches are Managed by a FortiGate.)
Directions are below.
Requirments:
Two FortiSwitches capable of MCLAG (Model 200+) Two NIC ports in the ESXi hosts One cable from the ESXi host connecting to each switch vSwitch Standard Settings I&rsquo;ve only tested this with Standard vSwitches, so my directions will only cover them.</description>
</item>
<item>
<title>FortiGate CLI LDAP Test</title>
<link>https://www.clintmcguire.com/blog/fortigate-cli-ldap-test/</link>
<pubDate>Sun, 04 Jul 2021 10:44:13 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/fortigate-cli-ldap-test/</guid>
<description>The Symptoms A client was having an issue with IPsec VPN connections to their FortiGate. Users were getting non-descriptive error messages and not able to connect. The issue was affecting all users. We couldn&rsquo;t find anything in the FortiClient or FortiGate logs to indicate what the problem was. As far as we could see, the FortiClient connection was simply timing out.
The FortiGate Web GUI showed us LDAP was working. Looking at packet traces on the FortiGate we could see the IPsec traffic come in, but we weren&rsquo;t seeing any traffic going back to the source.</description>
</item>
<item>
<title>FortiGate SSL Inspection Exclusion</title>
<link>https://www.clintmcguire.com/blog/fortigatessldeepinspectionexclusion/</link>
<pubDate>Tue, 02 Jun 2020 23:04:11 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/fortigatessldeepinspectionexclusion/</guid>
<description>Things weren&rsquo;t working as expected I had recently enabled the SSL Deep Inspection policy on some of my web traffic - in part to try to block ads, maybe I&rsquo;ll write a blog post about that another time - and I was noticing odd behaviour.
A few of the odd things were around VPN connections and Citrix sessions.
FortiClient VPN wasn&rsquo;t able to connect - it was getting to 80% then throwing an error saying there was something wrong w/ my credentials or my account wasn&rsquo;t setup for VPN access.</description>
</item>
<item>
<title>BGP Local Preference</title>
<link>https://www.clintmcguire.com/blog/bgplocpref/</link>
<pubDate>Mon, 01 Jun 2020 21:49:42 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/bgplocpref/</guid>
<description>Local Preference I needed to use BGP to advertise the networks in a multi-site network, with FortiGates acting as routers at each site. Using iBGP we configured the Primary Subnet at the Primary Date Center to also be advertised by the DR Data Center. However, because the workload would only be active at the Primary DC - until an actual DR event happened - we needed to ensure that traffic for that subnet would only be routed to the Primary DC.</description>
</item>
<item>
<title>ADVPN Overview</title>
<link>https://www.clintmcguire.com/blog/advpn-overview/</link>
<pubDate>Fri, 29 May 2020 10:15:14 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/advpn-overview/</guid>
<description>High Level Overview To explain ADVPN it is useful to contrast it with the two main alternatives - Hub &amp; Spoke and Full Mesh.
In a Hub &amp; Spoke network one site is deemed the Hub, with all other sites - Spokes - connecting directly to the Hub. In a Full Mesh all sites connect to all other sites.
ADVPN starts as Hub &amp; Spoke, with one site deemed the Hub - but all Spokes can directly connect by getting connection details from the Hub.</description>
</item>
<item>
<title>FortiManager VPN Certificate</title>
<link>https://www.clintmcguire.com/blog/fortimanager-vpn-certificate/</link>
<pubDate>Wed, 27 May 2020 23:18:28 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/fortimanager-vpn-certificate/</guid>
<description>Issue FortiManager, when it&rsquo;s new - I think, will sometimes try to push a certificate to FortiGate devices.
The error message in FortiManager is spread across four lines, they are:
&ldquo;Input is not a valid CA certificate.&rdquo;
&ldquo;The field ca is empty!&rdquo;
&ldquo;node_check_object fail! for ca&rdquo;
&ldquo;Attribute &lsquo;ca&rsquo; MUST be set.&rdquo;
I&rsquo;ve run into this in my lab, and I&rsquo;m pretty sure I saw this in a production FortiManager.
I found this issue discussed on the Fortinet forums, but I didn&rsquo;t find the solution there.</description>
</item>
<item>
<title>FortiGate Scripting</title>
<link>https://www.clintmcguire.com/blog/fortigate-scripting/</link>
<pubDate>Tue, 26 May 2020 22:51:16 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/fortigate-scripting/</guid>
<description>FortiGate Scripts I&rsquo;ve been doing quite a bit of scripting for FortiGates recently. Much of it in TCL.
FortiManager is capapble of running TCL scripts, which allow for the script to make decisions.
For example, I have a script that will check the name of the FortiGate it is running on, then based on the hostname, it will assign different values to the device. I needed to write this script so I could roll out ADVPN to multiple sites, for a client.</description>
</item>
<item>
<title>Optimization</title>
<link>https://www.clintmcguire.com/blog/optimization/</link>
<pubDate>Sun, 05 Apr 2020 23:42:24 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/optimization/</guid>
<description>Problems My site was not available over HTTPS. My site was slow to load. Investigation - HTTPS This site is hosted on GitHub, so going through their documentation it looked like I should have been able to use a CDN and still have GitHub generate a cert for the site. However, it was not.
Solution - HTTPS As an experiment I disabled the CDN, to see if GitHub would be able to generate the certificate - this worked pretty quickly and in the end was pretty simple.</description>
</item>
<item>
<title>Home Lab</title>
<link>https://www.clintmcguire.com/blog/homelab/</link>
<pubDate>Sat, 04 Apr 2020 22:43:54 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/homelab/</guid>
<description>Home Lab Build This seems like good time to dust off the home lab gear. So I&rsquo;ve pulled the hardware out and made sure everything has downloaded all the updates.
My lab is pretty simple.
The network is a FortiGate, FortiSwitch and FortiAP.
The compute and storage is a desktop that I&rsquo;ve jammed as many SSDs into as I can.
I&rsquo;m running Hyper-V on Windows 10, because it is simple and provides the features I need.</description>
</item>
<item>
<title>FortiGate SD-WAN Setup</title>
<link>https://www.clintmcguire.com/blog/fortigate-sdwan-setup/</link>
<pubDate>Wed, 01 Apr 2020 21:35:39 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/fortigate-sdwan-setup/</guid>
<description>Minimal Requirements Here are the quick and dirty steps to get SD-WAN up and running on a FortiGate.
I&rsquo;m running FortiOS 6.2.3 on 60E.
SD-WAN Interface Under Network -&gt; SD-WAN:
Set the Status to Enabled Add at least one available port to the SD-WAN Interface Members Hit Apply Perfomance Metrics Under Network -&gt; Performance SLA:
Create a new SLA Give it a Name For Protocol pick Ping Add two IPs for servers to run ping tests against - I&rsquo;d recommend 1.</description>
</item>
<item>
<title>4 Segment Network</title>
<link>https://www.clintmcguire.com/blog/4-segment-network/</link>
<pubDate>Wed, 01 Apr 2020 21:00:55 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/4-segment-network/</guid>
<description>Purpose How do you design a well-organized, well managed network for small/medium business?
Let&rsquo;s layout some assumptions:
There are server in the office The servers are in either in a well-organized closet or in a server room (they are not in a Colo - but access is restricted) There may be some amount of Cloud/SaaS applications This is not a VDI environment (we could sketch that out in a different post) Security is a concern - but not security at any cost Let&rsquo;s start with what I generally see As a consultant, I&rsquo;ve been engaged by dozens of small/medium size businesses and many large businesses.</description>
</item>
<item>
<title>Hashing</title>
<link>https://www.clintmcguire.com/blog/hashing/</link>
<pubDate>Mon, 30 Mar 2020 21:22:11 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/hashing/</guid>
<description>What is Hashing Very simplified: Hashing is a mathmatical operation used to take an Input and turn it into a different Output.
More specifically: the hasning function will take an input of variable size and produce an output of a fixed size. The mathmatical process should not be reversible, the same input should always yield a constant output, a small change to the input should have a large change on the output, and two different inputs should never generate the same output.</description>
</item>
<item>
<title>Crypto Cipher Suite Comparison</title>
<link>https://www.clintmcguire.com/blog/crypto-cipher-suite-comparison/</link>
<pubDate>Sun, 29 Mar 2020 11:26:57 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/crypto-cipher-suite-comparison/</guid>
<description>Components As detailed in my post on Cryptographic Cipher Suites each of the suites has a Protocol, a Key Exchange algorithm, a Signature Authentication algorithm, an Encryption algorithm, and a Message Authentication algorithm.
Here we are going to compare these different components and highlight the cipher suites currently considered strong*.
* currently only means at the time of this writting - a flaw could be found in the algorithm or in the implementation of the algorithm at any time, so do additional research to confirm the current strength of the cipher suite.</description>
</item>
<item>
<title>Cryptographic Cipher Suites</title>
<link>https://www.clintmcguire.com/blog/cryptographic-cipher-suites/</link>
<pubDate>Sat, 28 Mar 2020 10:54:00 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/cryptographic-cipher-suites/</guid>
<description>What are Cryptographic Cipher Suites Cipher suites are a combination of different algorithms the system will use to encrypt the communication. Each operating system/application will have a set of suites it is capable of supporting.
Let&rsquo;s take a few examples - using the IANA names:
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_NULL_SHA Each of these suites has a Protocol, a Key Exchange algorithm, a Signature Authentication algorithm, an Encryption algorithm, and a Message Authentication algorithm.</description>
</item>
<item>
<title>DNS Tools</title>
<link>https://www.clintmcguire.com/blog/dns-tools/</link>
<pubDate>Fri, 18 Oct 2019 19:29:34 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/dns-tools/</guid>
<description>General Tools nslookup - standard tool, comes with most OSes http://MXToolbox.com - Very useful site for doing DNS things, generally focused on email related checks - as the name implies - but still includes more general DNS lookup options Test-Connection - in PowerShell 6, this is really more of a super charged ping - but throw -ResolveDestination at it and it will do a lookup for you dnssec-analyzer - for testing DNSSEC Whois Lookup - mxtoolbox&rsquo;s whois lookup hasn&rsquo;t worked for me the last number of times I&rsquo;ve used it, this one does&hellip; I&rsquo;m pretty sure I&rsquo;m forgetting 1 or 2, so I will come back and add them when I remember&hellip;</description>
</item>
<item>
<title>DNSSEC</title>
<link>https://www.clintmcguire.com/blog/dnssec/</link>
<pubDate>Thu, 17 Oct 2019 19:24:10 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/dnssec/</guid>
<description>How it works with Cloudflare Cloudflare hosts my DNS. It provides me a simple interface for management, 2FA for login and acts as a CDN. So it was an easy choice years ago to move DNS there.
Since I&rsquo;ve been thinking about DNS a lot lately I decided to see if I could setup DNSSEC for my own domain.
It took my about 5 minutes.
In Cloudflare - under DNS, hit the button to Setup DNSSEC.</description>
</item>
<item>
<title>How DNS Really Works</title>
<link>https://www.clintmcguire.com/blog/how-dns-really-works/</link>
<pubDate>Wed, 16 Oct 2019 19:01:53 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/how-dns-really-works/</guid>
<description>View from the client A client system - phone, dekstop, laptop, server - looking to find an IP address for a name, lets use www.clintmcguire.com as an example, sends a DNS request to its configured name resolvers.
Name resolvers are either statically assigned by a network administrator or handed out by DHCP.
The client sends a request - typically via UDP - on port 53, to the name resolver. This is a question, asking for the Resource Record (RR) details that match a name/domain name.</description>
</item>
<item>
<title>How DNS Works</title>
<link>https://www.clintmcguire.com/blog/how-dns-works/</link>
<pubDate>Tue, 15 Oct 2019 21:32:04 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/how-dns-works/</guid>
<description>DNS Analogy The analogy typically used to explain what DNS does is to compare it to a Phone Book. Which isn&rsquo;t a great analogy, when you look at how DNS works.
I think I have a better analogy. The downside of my proposed analogy, is that it requires some additional explaining - although I suspect people coming out of school today aren&rsquo;t very familiar with phone books anymore either&hellip;
Here is my suggestion for a better analogy&hellip;</description>
</item>
<item>
<title>NTP</title>
<link>https://www.clintmcguire.com/blog/ntp/</link>
<pubDate>Sat, 07 Sep 2019 10:27:41 -0700</pubDate>
<guid>https://www.clintmcguire.com/blog/ntp/</guid>
<description>Time in Windows - for Domains In a Windows Domain, the default config is for the PDC to get time from an external time source, the other DCs to get time from the PDC and the domain members to get time for a DC in their Site.
So only the PDC should need to be modified.
The commands to configure the PDC to get time from the NTP Pool servers:</description>
</item>
<item>
<title>Find Azure Market Place Image Offers from PowerShell</title>
<link>https://www.clintmcguire.com/blog/find-az-offers/</link>
<pubDate>Sat, 23 Feb 2019 17:56:25 -0800</pubDate>
<guid>https://www.clintmcguire.com/blog/find-az-offers/</guid>
<description>Following up on my post about finding Azure Images by Publisher, here is how to get all the SKUs for the specific Offers.
Get-AzVMImageSKu is the command to run.
It requires Location, Publisher, and Offer.
For example: Get-AzVMImageSku -Location &rsquo;eastus&rsquo; -publisher &lsquo;fortinet&rsquo; -Offer &lsquo;fortinet_fortigate-vm_v5&rsquo;
This will return the two SKUs - &ldquo;fortinet_fg-vm&rdquo; and &ldquo;fortinet_fg-vm_payg&rdquo;
You can take the SKUs and use those to deploy new VMs.</description>
</item>
<item>
<title>Find Azure Images by Publisher</title>
<link>https://www.clintmcguire.com/blog/find-az-images-by-publisher/</link>
<pubDate>Sun, 17 Feb 2019 14:18:16 -0800</pubDate>
<guid>https://www.clintmcguire.com/blog/find-az-images-by-publisher/</guid>
<description>First install the PowerShell Az Module.
On Windows, open an elevated PowerShell window and run: Install-Module -Name Az -AllowClobber
On MacOS, use sudo to open pwsh, then run: Install-Module -Name Az -AllowClobber
Once the Az module is installed, exit the elevated/sudo PowerShell session and open a regular PowerShell session.
Connect to your Azure account - Connect-AzAccount and use the device login URL and Code to sign in.
If you don&rsquo;t know the exact Publisher Name, you can find it by looking at all the Publishers.</description>
</item>
<item>
<title>Compare file hash with PowerShell</title>
<link>https://www.clintmcguire.com/blog/compare_file_hash_with_powershell/</link>
<pubDate>Tue, 05 Sep 2017 00:00:00 +0000</pubDate>
<guid>https://www.clintmcguire.com/blog/compare_file_hash_with_powershell/</guid>
<description>Once you&rsquo;ve downloaded the file use Get-FileHash to calculate the SHA256 hash.
$hash = (Get-FileHash .\filename.exe).hash
Copy the hash value from the website and assign it to a variable to compare.
$webhash = &quot;3...f'
[Paste the full SHA256 hash in the quotes]
Then use PowerShell to compare this to the published hash.
if ($hash -eq $webhash){$true}
This will return either &ldquo;True&rdquo; or nothing, if &ldquo;True&rdquo; then the hashes match.
Or if you want to do it in one line:</description>
</item>
<item>
<title>Resolve all Remote Hosts that you are Connected</title>
<link>https://www.clintmcguire.com/blog/resolve_all_remote_hosts_that_you_are_connected/</link>
<pubDate>Tue, 29 Aug 2017 00:00:00 +0000</pubDate>
<guid>https://www.clintmcguire.com/blog/resolve_all_remote_hosts_that_you_are_connected/</guid>
<description>I was looking into an certificate issue a client was having with their web proxy and in testing I thought it might be helpful to resolve the DNS names for all the open connections on ports 80 and 443.
A quick netstat -anop tcp shows too many connections to bother doing manually and scraping the output with PowerShell would be possible, but isn&rsquo;t my first choice.
Thankfully Get-NetTCPConnections will show very similar details to the netstat above, so I started there.</description>
</item>
<item>
<title>Stop all processes with the same name</title>
<link>https://www.clintmcguire.com/blog/stop_all_processes_with_the_same_name/</link>
<pubDate>Tue, 22 Aug 2017 00:00:00 +0000</pubDate>
<guid>https://www.clintmcguire.com/blog/stop_all_processes_with_the_same_name/</guid>
<description>I have a utility server that I connect to frequently and for some reason or other, that I haven&rsquo;t had time to investigate yet, a certain Citrix related process launches and re-launches. Over the course of weeks there can be 30+ instances of this process running under my user account.
The specific process doesn&rsquo;t take up much CPU or RAM, but it is annoying and if I someone else is using the server for real work, then those resources could be better allocated.</description>
</item>
<item>
<title>Red Hat Enterprise Linux Training - Notes</title>
<link>https://www.clintmcguire.com/blog/redhat_enterprise_linux_training_notes/</link>
<pubDate>Wed, 05 Jul 2017 00:00:00 +0000</pubDate>
<guid>https://www.clintmcguire.com/blog/redhat_enterprise_linux_training_notes/</guid>
<description>Notes from RHEL 7 Partner Training&hellip;
You can access Red Hat Support via the CLI tool redhat-support-tool The tool gives you access to the KB, which you can search from the CLI and you can work with support tickets.
Running sosreport will create an archive file with logs and other info that can be attached to a ticket.
redhat-support-tool has options for attaching files, it will look for an sosreport when you first open the ticket.</description>
</item>
<item>
<title>Use PowerShell to test connection to a port</title>
<link>https://www.clintmcguire.com/blog/use_powershell_to_test_connection_to_a_port/</link>
<pubDate>Tue, 13 Jun 2017 00:00:00 +0000</pubDate>
<guid>https://www.clintmcguire.com/blog/use_powershell_to_test_connection_to_a_port/</guid>
<description>To quickly test if you can communicate with a server on a specific port use this command: Test-NetConnection (hostname/ip) -Port (tcp port number) You are looking for TcpTestSucceeded : True in the output.
Example: PS C:\Users\Clint&gt; Test-NetConnection www.google.com -port 80
ComputerName : www.google.com RemoteAddress : 74.125.28.103 RemotePort : 80 InterfaceAlias : vEthernet (LAN) 2 SourceAddress : 192.168.0.5 TcpTestSucceeded : True
This command is quite flexible, you can also have it test with ICMP like PING and Trace Route.</description>
</item>
<item>
<title>Powershell script to get all computers last logon time</title>
<link>https://www.clintmcguire.com/blog/powershell_script_to_get_all_computers_last_logon_time/</link>
<pubDate>Sun, 29 May 2011 00:00:00 +0000</pubDate>
<guid>https://www.clintmcguire.com/blog/powershell_script_to_get_all_computers_last_logon_time/</guid>
<description>Update I&rsquo;ve posted an updated version of this script in a new section of my blog. Because all the comments below relate to the original version of the script I&rsquo;m going to leave that version posted here. You can find the new version of the script here.
I wrote a script to get the last time each computer logged into the domain.
This script is very similar to my script that gets user last logon times, which you can find here.</description>
</item>
</channel>
</rss>