-
SAN Implementation
In my previous post, I talked about what a SAN is and how it can be used- now, in this post, I’m going to share my hands-on experience configuring one. There are three SAN components: host, storage, SAN fabric (cables, networking hardware). All SAN storage devices are called targets, while the initiators are the servers…
-
Storage Area Networks (SAN)-background
Data centers have the infrastructure to hold, and support, vast numbers of servers, ensuring connectivity, redundancy, and protective factors such as temperature control, fire safety, and physical safety. There are three layers: the access layer/edge layer (closest to the machines themselves), distribution layer (switches connecting those access layer switches), and finally the motherlode of them…
-
Hardening Windows: Kerberos
There are a number of network hardening solutions, including network authentication. This is the process of authenticating the identity provided, to ensure proper access to network resources. There are several approaches: the challenge-response/three-way-handshake, which uses a shared secret, OAuth (an internet, token-based authentication system), OpenID (open source, third party service allows non-related sites access to…
-
Windows: Creating a Group
In this exercise, I accessed a VM and within the Active Directory, created a ‘Managers’ group within a OU container (‘Users’). I have to say it’s a little strange working in a GUI like this after spending so much time on a command line interface! Now, time to fill out this newly-created Managers group with…
-
Windows: Managing User Accounts (Active Directory)
In my previous post, I created a user within an OU, and now I’m going to practice managing user accounts. Brace yourself, the fun is about to begin! 🙂 Similar to before, I accessed the virtual machine Windows Server > Tools > AD Users and Computers. First, I practiced unlocking a user account. Next, I…
-
Windows: Creating User Accounts
In my security class, I am learning much more about the Windows security environment, and that including creating user accounts. Here are some of what I learned from my hands-on practice to put into play what I learned. Here I’m working on a Windows Server Virtual Machine: Next, I select Tools > Active Directory Users…
-
Windows: Group Policies (GPO)
Continuing the education (for me) of the Windows world, being that my background has been working on a Mac workstation, configuring Linux instances, and while working on a Windows platform, I never looked behind the curtain, as it were. So here we go! Group Policy Management is the umbrella approach for creating Group Policy Objects…
-
Entering the Windows world (AD)
Much of my background has been working with Linux OS and such in terms of creating a network and allocating resources, configuration, and such. So, when the networking class carved out an entire section on Active Directories, Domains, and configuration, I decided to write down some of my thoughts and experiences here. Definitely gives me…