Saturday, December 28, 2019

Tips and Tricks-Azure VM backdoor entry


New post on NS IT Automation

Tips and Tricks-Azure VM backdoor entry

by NS IT Automation
Table of Contents
  1. Purpose
  2. SCOPE
  3. Pre requisites
  4. Re-set Local Administrator password of Azure VM
  5. Access VM via serial console
    5.1 Connect to Azure VM via Azure portal Serial Console
    5.2 Conclusion
    5.3 Some command line
    5.4 Restart VM from serial console
  6. End of Document
Go To Home
NS IT Automation | December 28, 2019 at 5:49 pm | Categories: Azure, Tips and Tricks | URL: https://wp.me/pbsJKd-vW
Comment    See all comments
Unsubscribe to no longer receive posts from NS IT Automation.
Change your email settings at Manage Subscriptions.
Trouble clicking? Copy and paste this URL into your browser:
https://nsitautomation.in/tips-and-tricks-azure-vm-backdoor-entry/

Tuesday, December 24, 2019

Azure Load Balancer for Web Server (Implement step by step)

New post on NS IT Automation

Azure Load Balancer for Web Server (Implement step by step)

by NS IT Automation
  1. Purpose of document
  2. Understanding Load Balancer
  3. "Load Balancer" use cases
  4. Related Objects
  5. Use case 2 (Implement Load Balancer for Web server port 80)
    5.1. Resource Group
    5.2. Create Virtual Network (VNET)
    5.3. Create Network Security Group (NSG)
    5.4. Associate Subnet to NSG
    5.5. Public IP address
    5.6. Public Load Balancer
    5.6.1. Backend Pool
    5.6.2. Health Probes
    5.6.3. Load balance rule
    5.7. Virtual Machine
    5.8. Install Web Server in both VM's
    5.9. Prepare test Web page
    5.10. Load balancer Final Status check
    5.11. Load balancer Connect
    5.12. Final result
  6. End of Document
Go To Home
Comment    See all comments
Unsubscribe to no longer receive posts from NS IT Automation.
Change your email settings at Manage Subscriptions.
Trouble clicking? Copy and paste this URL into your browser:
https://nsitautomation.in/azure-load-balancer-for-web-server/

Azure Load Balancer for RDP

New post on NS IT Automation

Azure Load Balancer for RDP

by NS IT Automation
  1. Purpose of document
  2. Understanding Load Balancer
  3. "Load Balancer" use cases
  4. Related Objects
  5. Use case 1 (Implement Load Balancer for RDP port 3389)
    5.1. Resource Group
    5.2. Create Virtual Network (VNET)
    5.3. Create Network Security Group (NSG)
    5.4. Associate SN to NSG
    5.5. Public IP address
    5.6. Public Load Balancer
    5.6.1. Backend Pool
    5.6.2. Health Probes
    5.6.3. Load balance rule
    5.7. Virtual Machine
    5.8. Load balancer Final Status
    5.9. Connect Load balancer
    5.10. Final result
  6. End of Document
Go To Home
Comment    See all comments
Unsubscribe to no longer receive posts from NS IT Automation.
Change your email settings at Manage Subscriptions.
Trouble clicking? Copy and paste this URL into your browser:
https://nsitautomation.in/azure-load-balancer-for-rdp/

Connect Azure Linux VM securely using Public and Private Key



NS IT Automation posted: " Purpose of documentCreate Azure Linux VMTools used Puttygen and PuttyTools Download locationGenerate Key Pair (Public and Private) using "puttygen.exe" 5.1. Public Key 5.2. Private KeyBuild Azure Linux VM and upload Public KeyConnect Azure Linux VM"

New post on NS IT Automation

Connect Azure Linux VM securely using Public and Private Key

by NS IT Automation
  1. Purpose of document
  2. Create Azure Linux VM
  3. Tools used Puttygen and Putty
  4. Tools Download location
  5. Generate Key Pair (Public and Private) using "puttygen.exe"
    5.1. Public Key
    5.2. Private Key
  6. Build Azure Linux VM and upload Public Key
  7. Connect Azure Linux VM via private key pair and passphrase (Dual authentication)
  8. End of Document
Go To Home
Comment    See all comments
Unsubscribe to no longer receive posts from NS IT Automation.
Change your email settings at Manage Subscriptions.
Trouble clicking? Copy and paste this URL into your browser:
https://nsitautomation.in/connect-azure-linux-vm-securely-using-public-and-private-key/

Red Hat Linux create high privileged user

New post on NS IT Automation

Red Hat Linux create high privileged user

by NS IT Automation
Table of Contents
Red Hat Linux create high privileged user
  1. Purpose of document
  2. Create User and set password
  3. Grant high privilege access to user
    3.1. Process 1
    3.2. Process 2
  4. End of Document
Go To Home
Comment    See all comments
Unsubscribe to no longer receive posts from NS IT Automation.
Change your email settings at Manage Subscriptions.
Trouble clicking? Copy and paste this URL into your browser:
https://nsitautomation.in/red-hat-linux-create-high-privileged-user/

Azure Availability Set (Concept and implement step by step)


New post on NS IT Automation

Azure Availability Set (Concept and implement step by step)

by NS IT Automation
Table of Contents
  1. Purpose of document
  2. Understanding Availability Set
  3. Recommendations for Availability Set
  4. Limitation
  5. "Availability Set" use cases
  6. VM's Without Availability Set
  7. VM's With Availability set
    6.1. Below situation explain Fault Domain
    6.2. Below situation explain Update Domain
  8. VM status without Availability Set
  9. Create VM in Availability Set (LAB step by step)
    9.1. Create Resource Group
    9.2. Create Availability Set
    9.3. Create Virtual Network (VNET)
    9.4. Create Network Security Group (NSG)
    9.5. Create Public IP
    9.6. Create VM and associate Availability Set
    9.7. Issue with Availability Set
    9.8. Availability Set associated to VM (Status)
    9.9. VM's associated to Availability Set (Status)
    9.10. Common error Message
  10. End of Document
Go To Home
Comment    See all comments
Unsubscribe to no longer receive posts from NS IT Automation.
Change your email settings at Manage Subscriptions.
Trouble clicking? Copy and paste this URL into your browser:
https://nsitautomation.in/azure-availability-set-concept-and-implement-step-by-step/

Azure Virtual Machine Disk Encryption



NS IT Automation posted: " Table of Contents Azure security checks and recommendations Disk Encryption: 2.1 Require Managed disk for Disk Encryption 2.2 Process to convert unmanaged disk to Managed Disk 2.3 Disk Encryption 2.4 Key Vault Creation Process 2.5 Ver"

New post on NS IT Automation

Azure Virtual Machine Disk Encryption

by NS IT Automation
Table of Contents
  1. Azure security checks and recommendations
  2. Disk Encryption:
    2.1 Require Managed disk for Disk Encryption
    2.2 Process to convert unmanaged disk to Managed Disk
    2.3 Disk Encryption
    2.4 Key Vault Creation Process
    2.5 Verification of Disk Encryption
  3. End of Document
Go To Home
Comment    See all comments
Unsubscribe to no longer receive posts from NS IT Automation.
Change your email settings at Manage Subscriptions.
Trouble clicking? Copy and paste this URL into your browser:
https://nsitautomation.in/azure-virtual-machine-disk-encryption/

MFA Configuration in Azure

New post on NS IT Automation

MFA Configuration in Azure

by NS IT Automation
Table of Contents
  1. Enable MFA in Azure
  2. Create New User in AAD
  3. Enable MFA for User
  4. One time MFA configuration and Security verification for User
  5. User is configured to access MFA
  6. End of Document
Go To Home
Comment    See all comments
Unsubscribe to no longer receive posts from NS IT Automation.
Change your email settings at Manage Subscriptions.
Trouble clicking? Copy and paste this URL into your browser:
https://nsitautomation.in/mfa-configuration-in-azure/