Popular Tags:

What is AWS?

June 20, 2017 at 8:18 pm

AWS

I am taking careful notes on the incredible AWS course at CBT Nuggets for AWS Technical Essentials. Enjoy the notes for this first Nugget in the course – What is AWS?

  • “The Cloud” – specifically the public cloud
  • CBT Nuggets, GMAIL, DropBox are all valid examples of common cloud usage today
  • Access everywhere
  • SaaS (Software as a Service)
  • Pool of resources; multi-tenant; rapid provisioning; on-demand (as-a-service); like a utility bill; scalability; elasticity
  • Cost effective; easy to “on-ramp”
  • Hybrid – part of your usage is in the public cloud while part of it is in your private cloud
  • 1995 – Amazon.com; 2006 – AWS; 2009 – RDS; 2011 – Elastic Beanstalk; 2016 – Lambda
  • Regulations compliance is also available in AWS

The Quiz Questions – Be sure to post your answers in the comments below:

  • Rapid provisioning allows you to very quickly spin up a new virtual machine with minimal effort. True or false?
  • As Ben describes it, a hybrid setup is one in which part of your resources are in AWS, and the rest are with another cloud provider. True or false?
  • In what year did Amazon release Amazon Web Services?
    • a) 1995
    • b) 2006
    • c) 2016
    • d) 2008

 

Pearson Education (InformIT)

Create and Manage Group Policy Objects (GPOs) Part 2 of 2

June 7, 2017 at 3:45 pm

Group Policy

In this second post of two of basic Group Policy management, we discuss further topics involving these critical Windows management components.

Backup, Restore, Import and Copy Group Policy Objects (GPOs)

You can perform all backup and restore operations using the Group Policy Management console, or with Windows PowerShell cmdlets.

To backup all GPOs in your domain, open the Group Policy Management console and navigate to the Group Policy Objects node. Right-click the Group Policy Objects node, and then click Back Up All. You can also backup a specific object. To backup a specific GPO, in the Group Policy Objects node, click and then right-click the specific GPO you want to back up, and then click Back Up.

To restore a GPO, right-click the appropriate GPO in the Group Policy Objects node, and then click Restore from Backup.

You can also manage your backups from the Group Policy Management console. You can use the Manage Backups option to view the settings in a backup, to delete a backup, and to restore a backup. To access the Manage Backups tool, in the Group Policy Management console right-click the Group Policy Objects node, and then click Manage Backups. In the Manage Backups dialog box select the backup you want to manage, and then click Restore, Delete, or View Settings, as required.

Although you can link the same GPO to multiple containers, including domains, it is not always best to do this. Usually, it is better to import a GPO from another domain. The import process requires that you effectively restore the settings of another GPO into a newly created, empty GPO.

The process therefore starts with you creating a backup of the source GPO. To import the settings, in the Group Policy Management console on the target domain, create a new GPO in the Group Policy Objects node Right-click the new GPO, and then click Import Settings.

You can duplicate the settings in one GPO for reuse in another. An easy way to do this is to copy a GPO. In the Group Policy Management console, in the Group Policy Objects node, right-click the source GPO, and then click Copy. You can right click the Group Policy Objects node and choose Paste in order to duplicate the settings.

Create and Configure a Migration Table

There is a Migration Table Editor available inside the Group Policy Management tool that permits you to edit UNC and security principle references that might not apply to the domain where you are importing your Group Policy Object settings into. Simply reference this saved table of entries when you are following the Import Settings Wizard.

Reset Default GPOs

There is a simple tool called dcgpofix that you can use at the command prompt to reset the default GPOs back to their default settings. Remember, there is a Default Domain GPO and a Default Domain Controllers GPO. The tool features switches so that you can pic one or the other GPO to reset instead of resetting both.

Delegate Group Policy Management

Remember that you can delegate control over GPO tasks. This is done with the Delegation tab in the Group Policy Management tool, or you can delegate GPO tasks using the Active Directory Users and Computers tool.

Detect Health Issues

You can detect problems with your GPO infrastructure using the Group Policy Management console as well. This is done using the GPO Infrastructure Status page. To view the status, use the following procedure:

1. Select the domain object, and then click the Status tab.

2. To view the current status, click Detect Now.

3. Review the information in the details pane.

Create and Manage Group Policy Objects (GPOs) Part 1 of 2

May 30, 2017 at 10:34 pm

GPOs

GPOs Overview

Group Policy Objects (GPOs) are one of the most powerful components in a Windows Server 2016-based environment. Thanks to GPOs, you can easily manage:

  • Windows settings
  • Application settings
  • Software deployment
  • Folder redirection (user Home folders)
  • Security settings
  • Infrastructure settings such as wireless and networking

Local GPOs

While most environments leverage the power of Active Directory (AD) and assign GPOs through the AD infrastructure, you can use local GPOs to control computers and users that are not part of an AD. Keep in mind that if you apply local GPOs to a system that is part of an AD, the AD-based GPO settings will override the local settings.

There are multiple local GPOs you can use, including:

  • Local Group Policy – this is the “classic” local Group Policy Object that contains a user and computer node with setting for each
  • Administrators and Non-Administrators Local Group Policy – this GPO allows you to control local admins versus non admins; it only has a user node as you would expect
  • User Specific Local Group Policy – these GPOs allow you to configure user-specific settings

NOTE: If you apply all of these to a local system, the priority order is as listed. For example, a user-specific setting would override a local group policy setting.

To create these local GPOs, simply log in as a local administrator and use the mmc.exe syntax in the run menu. Add a Snap In for the Group Policy Object Editor and then Browse for the local computer or users options to create the above local GPO editors.

Linking AD GPOs

When we use GPOs in the Active Directory environment, we link them to specific AD objects in order to set their scope. These objects include:

  • Sites
  • Domains
  • Organizational Units (OUs)

You can link GPOs to these AD objects using GUI tools as well as PowerShell.

Manage Starter GPOs

It is possible to create a template that contains the most common settings for your enterprise and then use this GPO as a template for customize it for certain areas. This is called a Starter GPO. There is a Starter Node in the Group Policy Management console you can use for this purpose.

Mastering the CCIE Evolving Technologies Section Sample Questions

May 29, 2017 at 3:34 pm

Evolving

Here is a sample quiz using sample questions from my latest book – Mastering the CCIE Evolving Technologies Section. Have fun and good luck!

Mastering the CCIE Evolving Technologies Section

Start
Congratulations - you have completed Mastering the CCIE Evolving Technologies Section. You scored %%SCORE%% out of %%TOTAL%%. Your performance has been rated as %%RATING%%
Your answers are highlighted below.
Return
Shaded items are complete.
12345
6End
Return

Are You Smarter than a CCNA – Port Security

May 27, 2017 at 3:12 pm

CCNA

Challenge yourself with these questions about Port Security. These questions are from my text – CCNA Routing and Switching 200-125 Exam Cram (5th Edition)

1. If you issue the single switchport port-security command, name the
resulting port-security mode, violation action, and maximum number of
MAC addresses permitted.
_________

2. What form of port security combines aspects of dynamic learning with
static learning?
_________

3. What command allows you to verify the port-security settings of the Gi0/1
interface?
_________

 

4. What command precedes the switchport port-security command typically?
A. switchport port-security enable
B. switchport mode access
C. switchport mode secure
D. switchport data enable

 

5. What violation mode does Cisco not recommend?
A. Restrict
B. Shutdown
C. Error
D. Protect

 

6. What are two options for recovering from an error disabled port due to port
security? (Choose two.)
A. Port Security Auto Recovery
B. errdisable recovery
C. Manual recovery
D. Port Security Disable

Answers:

1. The mode is dynamic port security, the violation action is Shutdown, and the maximum MAC addresses is 1.

2. Sticky learning.

3. show port-security interface gi0/1

4. B is correct. The switchport mode access command typically must precede switchport port-security as the port cannot be dynamic.

5.  D is correct. Cisco does not recommend the Protect mode as it does not alert the administrator of any violation.

6. B and C are correct. You can have automatic recovery with errdisable recovery, or you can manually recover from the situation.