security

Optimizing Windows Event Logs for Enhanced Security and Troubleshooting

Introduction Windows Event Logs are crucial for both security and troubleshooting within IT environments. Whether you’re managing a datacenter or overseeing the security of an enterprise network, optimizing these logs can save valuable time and enhance your overall security posture. In this article, we’ll explore best practices for managing Windows Event Logs, advanced filtering techniques, […]

10 Tips for Improving User Security on Your Website

In today’s digital age, user security is a critical aspect of any online business or website. With cyber-attacks and data breaches on the rise, it’s essential to take proactive measures to protect your users’ data and privacy. In this article, we’ll provide 10 practical tips for improving user security on your website. Use HTTPS: Ensure […]

Advantages of using Commvault WorkFlow

  I created too many important workflows on Commvault. The use cases where I used workflows are as follows: Repetitive restore tests, Conditional backup that makes some operations before it, Create snapshots and mount snap disks to hosts from Hitachi, EMC, and HPE storages. They have been working without problems for years. So, I would […]

Security Tips for Storage and Backup Admins

1. EMC Networker: Change “remote access” option *@*  on every client” –> https://sysarticles.com/emc-networker-security-exploit-that-remote-access/ 2. Veritas Netbackup: Remove No.Restrictions file –> https://sysarticles.com/security-expolit-on-netbackup-no-restrictions/ 3. EMC VMAX: Change default password of SMC user in unisphere (take snapshot or backup before changing. If you would get “Failed to authenticate user.” error, there is no way to fix except restore or reinstall. […]

Security expolit on Netbackup (No.Restrictions)

Sometimes we or some consultants put No.Restrictions file in “INSTALL DIR\netbackup\db\altnames” directory, this option  makes our work easier. But it is a security risk, because of every netbackup client on the your network can restore data from any other clients. So, anybody can restore data of your important servers, then they can lookup and/or copy your important datas. To close this […]

Scroll to top