How To Open And Forward Ports On Unifi UDM PRO
In this tutorial you will learn how to open and forward ports to an internal LAN IP on your Unifi UDM Pro using Unifi Controller version 6.5.55. In the latest releases of the Unifi Controller, they have simplified the process for us and with a few simple steps you can quickly forward the ports you need.
Let’s get started.
First make sure you are running the latest controller version. At the time of this publication, it is 6.5.55.
- Log into your UDM Pro using unifi.ui.com or its IP address.
- Access the Unifi Controller and click Settings
- Click on Advanced Features and afterwards you will be presented with a page where you can apply your network rules.
- Now scroll down, locate and click on Advanced Gateway Settings.
- You should now be presented with the Advanced Gateway Settings Page.
- Click on the Create new Port Forwarding button.
- In the Port Forwarding window
How To Transfer Unifi UDM Pro Owner
In this tutorial you will learn in a few simple steps on how to transfer Unifi UDM Pro Owner to a new ui.com owner account. This will come handy when you acquired a new client or accidently used the wrong account to register the UDM Pro into unifi.ui.com
Option 1
Step 1: Make sure you have local access via IP to your UDM Pro before proceeding.
Step 2: Log into unifi.ui.com using the old ui.com owner account and all except the owner, remove all accounts that have access to your UDM Pro.
Step 3: Use the old owner account to log into UDM Pro using IP address
Step 4: Create a backup of all UDM Pro configurations.
Step 5: Create a new Super Admin “Local Access Only” account.
Step 6: Now in the UDM Pro settings disable Remote Access by going to
- Settings
- Advanced
- “Remote Access”.
Step 7: Log … Read the rest
How To Configure Unifi UDM Pro Controller 6.5.55 For Windows 10 VPN
In this tutorial you will learn how to configure a Unifi UDM Pro Controller 6.5.55 for Windows 10 VPN access. I will take you through the process of configuring a VPN Connection and a VPN user on Unifi Controller version 6.5.55 for your UDM Pro and then we will finish with configuring Windows 10 VPN client.
How to setup Ubuntu Desktop to access UDM PRO VPN Tunnel
Let’s start by logged into your UDM PRO and then follow these steps below.
- Click on Settings
- Click on Networks
- Click Add New Network
- Apply a Network Name for your VPN. For this tutorial I will name mine VPN-Access.
- Now that we have a name click on the Virtual Private network (VPN) expand arrow.
- Now for VPN Setup click on Advanced.
- Now Select Remote Access.
- Scroll down the page and locate Pre-shared Secret Key. End users will need to use this
Benefits Of Lean Six Sigma In The IT Sector
This article I am recognizing the many benefits of Lean Six Sigma in the IT sector. I believe that Lean Six Sigma can help IT professionals with their company’s growth, if they have a sincere mindset.
Many IT organizations are under pressure to improve their service and process capability. In the quest for improvement methodologies, these businesses often adopt a “pick one” strategy. However, it is possible to integrate Lean and Six Sigma and reap the full benefits that these methodologies can bring to the table.
For businesses to be successful, they must work hard to go above and beyond. Lean Six Sigma is a rigorous method of eliminating defects in any process. It is a data-driven approach and methodology for ensuring near perfection. This approach must not produce more than 3.4 defective results per million opportunities. In order to achieve lean six sigma quality, businesses must focus on improving … Read the rest
How To Remove Splashtop Software
So, we have bumped into Splashtop Software, and we wish to uninstall it from all the computers. Unfortunately, we cannot find the uninstaller in add or remove programs so the next best solution would be to run a Command Script to remove the Splashtop Software.
What is Splashtop anyways?
Splashtop is a family of remote-desktop software and remote support software, developed by Splashtop Inc. Splashtop enables users to remotely access or remotely support computers from desktop and mobile devices. Splashtop enables remote computer access for businesses, IT support and help desks, MSPs, and educational institutions.
In a few steps we will have the Splashtop Software removed.
- Open Notepad.
- Copy and paste the following into notepad.
msiexec /x {B7C5EA94-B96A-41F5-BE95-25D78B486678} /qn REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Splashtop Inc." /f > nul 2> nul REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Splashtop Inc." /f > nul 2> nul RMDIR /S /Q "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server" > nul 2> nul RMDIR /S
SSRF Vulnerability In VMware Authentication
Researchers have found that VMware has a server-side request forgery (SSRF) vulnerability could allow an attacker to obtain administrative JSON Web Tokens (JWT) in versions of the VMware authentication software.
This serious security vulnerability was found in a popular service called VMware Workspace ONE Access. It’s used to provide multi-factor authentication, conditional access, and single sign-on to web and mobile apps. The vulnerability could enable malicious actors to read the full response of HTTP requests. This vulnerability is tracked as CVE-2021-22056. It has a severity score of 5.5, or ‘moderate’.
Security researchers Shubham Shah and Keiran Sampson discovered the bug that could lead to the leaking of JWTs. This would give malicious actors full access to vulnerable systems. JWTs are strings that act as a way to identify users. They contain JSON-encoded data, making them convenient for embedding information. They are typically used as session identifiers for mobile and web … Read the rest
How To Uninstall Atera Agent Software
So we have bumped into the Atera Agent Software and we wish to uninstall it from all the computers. You cannot find the uninstaller in add or remove programs so the next best solution would be to run a Command Script to remove the Atera Agent Software.
What is Atera anyways?
Atera provides a great an all-in-one management platform. It brings together remote IT monitoring and management, powerful ticketing and customer satisfaction surveying, billing and invoicing, and much more. Atera is used by IT support companies and MSPs in the US, Europe, and Asia.
In a few steps we will have the Atera Agent Software removed.
- Open Notepad.
- Copy and paste the following into notepad.
msiexec /x {EFB51F01-9805-4293-BB16-6F17EF4CEDF2} /qn timeout /t 5 /nobreak >nul sc stop AteraAgent > nul 2> nul sc delete AteraAgent > nul 2> nul taskkill /f /im TicketingTray.exe > nul 2> nul REG DELETE "HKEY_CURRENT_USER\Software\ATERA Networks"
Unifi VPN – L2TP Connection Attempt Failed After Installing KB5009543
Microsoft released a path KB5009543 during Patch Tuesday of 2022 which is resulting in Unifi VPN connections presenting you with the message, L2TP connection attempt failed because the security layer encountered a processing error during initial negotiations with the remote computer. Other vendors besides Unifi like, Sonicwall, Ciso Meraki and WatchGuard Firewalls are experiencing the same VPN connection access error.
Microsoft confirmed the issue, saying:
“After installing KB5009543, IP Security (IPSEC) connections which contain a Vendor ID might fail. VPN connections using Layer 2 Tunneling Protocol (L2TP) or IP security Internet Key Exchange (IPSEC IKE) might also be affected.”
Microsoft has released an out-of-band fix for the issue and adding the following statement.
… Read the restOut-of-band update to address issues after installing the January Windows update
Microsoft is releasing Out-of-band (OOB) updates today, January 17, 2022, for some versions of Windows. This update addresses issues related to VPN connectivity, Windows Server
Online Awareness Challenge: Social Media Red Flags Crossword
Introduction
Vertical
How to track file change events on your Windows File Server
In this tutorial you will be shown how to configure group policy to track file change events on your windows file server.
In the event of a data breach, businesses often want to know who accessed the data and when. They also want to know what kind of changes were made. With this method you can track file changes in your Windows file server. This will help you prevent insider threats by knowing who is accessing files they don’t need access to. Plus, it can help during data breach investigations by proving who changed what.
Step 1: Enabling the ‘Audit object access’ policy
-
Remote connect to your DC and Launch the Group Policy Management console (Run –> gpedit.msc)
-
Create a new GPO named “Server Audits” and apply it to the root of your domain.
3. Right click “Server Audits” policy followed by clicking on Edit within the menu.
4. Navigate … Read the rest