Category Archives: Uncategorized
MS-203 Microsoft 365 Messaging – Managing Compliance Part 3
5. Managing Journal Rules I’d like to now talk about Journaling Email. Now if you’re not familiar with Journaling Email, this is the concept of being able to track the communications of certain users. Now this could be a scenario where we are needing to get a look at some of the communications that are… Read More »
MS-203 Microsoft 365 Messaging – Managing Compliance Part 2
3. Understanding Data Loss Prevention (DLP) What exactly is Data Loss prevention? Well, it’s actually an industry standard based solution that is all about trying to identify in your environment what types of information are sensitive and making sure that that information does not get exfiltrated. Now what is exfiltrated? That basically means it gets… Read More »
MS-203 Microsoft 365 Messaging – Managing Compliance
1. Configuring Retention Policies in the EAC Now we’re going to do is we’re going to click on right here where it talks about compliance management. And you’re going to see two things involving retention. Here you’re going to see an option that says retention policies and retention tags. Now we’re going to start with… Read More »
MS-203 Microsoft 365 Messaging – Managing Connectors
1. Understanding Connectors So what exactly are connectors in exchange Connectors are objects that we’re going to create in our Exchange organization that is going to decide what to do when email is flowing inside of Exchange or email needs to flow outside of Exchange. So this is going to have a direct impact on… Read More »
MS-203 Microsoft 365 Messaging – Managing Mail Flow Topology Part 2
3. Mail Flow Transport Rules in Exchange Online Let’s take some time now and look at Exchange Online, okay, and how we can set up our mail flow transport rules using Exchange Online. So I’m on the Admin Microsoft. com site, also known as Portal Microsoft. com, and I’m going to go over here and… Read More »
MS-203 Microsoft 365 Messaging – Managing Mail Flow Topology
1. Understanding the Exchange Transport Architecture So let’s take some time now and talk about the Exchange transport architecture. So what exactly is happening behind the scenes whenever we are sending mail in and out, when mail is flowing from the inside to the outside? And how is Exchange actually managing and moving that mail… Read More »
312-50 EC Council CEH – Website Hacking – Discovering Vulnerabilities Automatically Part 2
4. Writing a Pentest Report Throughout the course we learned a number of methods to discover bugs and vulnerabilities in different types of software and infrastructure. Usually at the end of the Pen test, you will need to inform the client with all of the vulnerabilities that you found or with all of the findings.… Read More »
312-50 EC Council CEH – Website Hacking – Discovering Vulnerabilities Automatically
1. Automatically Scanning Target Website For Vulnerabilities So far we learned how to manually discover a number of very dangerous vulnerabilities. We’ve seen how they work and how to exploit them. In today’s video, I’d like to show you a tool that will allow you to automatically discover vulnerabilities in web applications. It will allow… Read More »
Amazon AWS Certified SysOps Administrator Associate – Monitoring, Auditing and Performance Part 8
16. [SAA] Config Overview Okay, let’s have a look at AWS config. So Config is a service that allows you to get auditing and record compliance of your resources in AWS based on some rules that you’re going to set. You can also record configuration and their changes over time to quickly be able to… Read More »
Amazon AWS Certified SysOps Administrator Associate – Monitoring, Auditing and Performance Part 7
14. [CCP/SAA/DVA] CloudTrail – Hands On Okay, so let’s learn about cloud trail. So let’s open the Cloud Trail service and we’re going to look at API activity within our account. So let me close these things and let’s go on the left hand side and let’s go to the dashboard. So currently the dashboard… Read More »