Cet atelier est présenté dans le cadre du cours MEC627 (baccalauréat en génie mécanique) qui porte sur les technologies de fabrication additive et demande aux étudiants d'établir une veille informationnelle sur ce sujet. L'atelier présente une méthode pour mettre en place une veille informationnelle ainsi que certains outils pertinents (p. ex. Feedly, Netvibes, etc.)
Session 8 - Creating Data Processing Services | Train the Trainers ProgramFIWARE
This technical session for Local Experts in Data Sharing (LEBDs), this session will explain how to create data processing services that are key to i4Trust.
Alfresco DevCon 2019: Encryption at-rest and in-transitToni de la Fuente
To guarantee data integrity and confidentiality in Alfresco, we need to implement authentication and encryption at-rest and in-transit. With micro services proliferation, orchestrating platforms, complex topologies of services and multiple programming languages, there is a demand of new ways to manage service-to-service communication, and in some cases, without the application needing to be aware. In addition to that, compliance requirements around encryption and authentication come to the picture requiring new ways to handle them. This talk will review encryption at-rest solutions for ADBP, and will be also discuss about solutions for encryption and authentication between services. This will be an introduction to service mesh and TLS/mTLS. We will see a demo of ACS running with Istio over EKS along with tools like WaveScope, Kiali, Jaeger, Grafana, Service Graph and Prometheus.
Cet atelier est présenté dans le cadre du cours MEC627 (baccalauréat en génie mécanique) qui porte sur les technologies de fabrication additive et demande aux étudiants d'établir une veille informationnelle sur ce sujet. L'atelier présente une méthode pour mettre en place une veille informationnelle ainsi que certains outils pertinents (p. ex. Feedly, Netvibes, etc.)
Session 8 - Creating Data Processing Services | Train the Trainers ProgramFIWARE
This technical session for Local Experts in Data Sharing (LEBDs), this session will explain how to create data processing services that are key to i4Trust.
Alfresco DevCon 2019: Encryption at-rest and in-transitToni de la Fuente
To guarantee data integrity and confidentiality in Alfresco, we need to implement authentication and encryption at-rest and in-transit. With micro services proliferation, orchestrating platforms, complex topologies of services and multiple programming languages, there is a demand of new ways to manage service-to-service communication, and in some cases, without the application needing to be aware. In addition to that, compliance requirements around encryption and authentication come to the picture requiring new ways to handle them. This talk will review encryption at-rest solutions for ADBP, and will be also discuss about solutions for encryption and authentication between services. This will be an introduction to service mesh and TLS/mTLS. We will see a demo of ACS running with Istio over EKS along with tools like WaveScope, Kiali, Jaeger, Grafana, Service Graph and Prometheus.
شرح لبرنامج فكرة للارشفة الالكترونية و افضل برامج الصادر و الوارد حيث يعمل البرنامج على ربط الادارات بشكل كبير عن طريق الصادر و الوارد لربط الاتصالات بين الادارات بشكل كامل مما يعمل على رفع الكفائة الانتاجية للشركات و المؤسسات بشكل كبير
Deploying On-Prem as SaaS: Why we go with AnsibleMartin Etmajer
How do you deploy a traditional on-premise solution as Software as a Service? Here, I am presenting architectural decisions and challenges faced in building and maturing an orchestration service for automating and managing deployments of Dynatrace, an application monitoring solution at enterprise scale, into Amazon's AWS cloud.
The focus of this presentation is on our experiences with Ansible, a radically simple, yet powerful, IT automation tool, whose agentless architecture and extensive modules library greatly simplified cloud service orchestration and integration of our solution with customer applications. Besides, automated testing of our deployment scripts with Test Kitchen and serverspec is discussed.
Splunk ES is one of the premium and widely used add-ons on the Splunk platform for security use cases. Asset and identity are one of the main concepts or we can say the building block of Splunk ES . In this session, we will understand how the asset and identity concept works and what supportive data we required for them to create a lookup.
You will learn:
• How to use Elastic Beanstalk
• How to run Single and Multi-Container Docker with AWS Elastic Beanstalk
• Best Practices running AWS Elastic Beanstalk
There’s an OpenBullet Attack Config for Your Site – What Should You Do?DevOps.com
Using commercially available attack tools like OpenBullet, Snipr MBA and BlackBullet has dramatically simplified the act of committing fraud through account takeovers, fake account creation or other automated attack. With thousands of configs available on the web, bad actors can find a pre-defined attacks for the retail, financial services, streaming media or other web application they want to target. If a predefined attack config for your company is discovered, how should you react?
In this session, Will Glazier, head of security research at Cequence Security will provide tips and techniques to help you uncover the existence of an attack config, then demonstrate how it is used in OpenBullet, providing pointers on how to use OpenBullet to your mitigation advantage. A demonstration of Cequence Bot Defense will wrap up the session. Discussion topics for the talk will include:
Researching Attack Configurations
- Forums
- Attack tools
- Using the power of Google
Turning the Tables: OpenBullet Deep Dive
- How it works
- Use it to your advantage: stop the attacks
Using OpenBullet Findings to Prevent Attacks
- Brief demo of Cequence Bot Defense
شرح لبرنامج فكرة للارشفة الالكترونية و افضل برامج الصادر و الوارد حيث يعمل البرنامج على ربط الادارات بشكل كبير عن طريق الصادر و الوارد لربط الاتصالات بين الادارات بشكل كامل مما يعمل على رفع الكفائة الانتاجية للشركات و المؤسسات بشكل كبير
Deploying On-Prem as SaaS: Why we go with AnsibleMartin Etmajer
How do you deploy a traditional on-premise solution as Software as a Service? Here, I am presenting architectural decisions and challenges faced in building and maturing an orchestration service for automating and managing deployments of Dynatrace, an application monitoring solution at enterprise scale, into Amazon's AWS cloud.
The focus of this presentation is on our experiences with Ansible, a radically simple, yet powerful, IT automation tool, whose agentless architecture and extensive modules library greatly simplified cloud service orchestration and integration of our solution with customer applications. Besides, automated testing of our deployment scripts with Test Kitchen and serverspec is discussed.
Splunk ES is one of the premium and widely used add-ons on the Splunk platform for security use cases. Asset and identity are one of the main concepts or we can say the building block of Splunk ES . In this session, we will understand how the asset and identity concept works and what supportive data we required for them to create a lookup.
You will learn:
• How to use Elastic Beanstalk
• How to run Single and Multi-Container Docker with AWS Elastic Beanstalk
• Best Practices running AWS Elastic Beanstalk
There’s an OpenBullet Attack Config for Your Site – What Should You Do?DevOps.com
Using commercially available attack tools like OpenBullet, Snipr MBA and BlackBullet has dramatically simplified the act of committing fraud through account takeovers, fake account creation or other automated attack. With thousands of configs available on the web, bad actors can find a pre-defined attacks for the retail, financial services, streaming media or other web application they want to target. If a predefined attack config for your company is discovered, how should you react?
In this session, Will Glazier, head of security research at Cequence Security will provide tips and techniques to help you uncover the existence of an attack config, then demonstrate how it is used in OpenBullet, providing pointers on how to use OpenBullet to your mitigation advantage. A demonstration of Cequence Bot Defense will wrap up the session. Discussion topics for the talk will include:
Researching Attack Configurations
- Forums
- Attack tools
- Using the power of Google
Turning the Tables: OpenBullet Deep Dive
- How it works
- Use it to your advantage: stop the attacks
Using OpenBullet Findings to Prevent Attacks
- Brief demo of Cequence Bot Defense
Presentation: 75 minutes
Lab: 75 minutes
After completing this module, the students will be able to:
Describe the different types of Exchange Server 2013 mailboxes.
Create and configure distribution groups.
Create and manage public folders.
Configure email address policies and address lists.
Required materials
To teach this module, you need the Microsoft® Office PowerPoint® file 20341B_03.pptx.
Important: We recommend that you use Office PowerPoint® 2007 or newer to display the slides for this course. If you use PowerPoint Viewer or an older version of Office PowerPoint, some features of the slides might not display correctly.
Preparation tasks
To prepare for this module:
Read all of the materials for this module.
Practice performing the demonstrations.
Practice performing the labs.
Work through the Module Review and Takeaways section, and determine how you will use this section to reinforce student learning and promote knowledge transfer to on-the-job performance.
As you prepare for this class, it is imperative that you complete the labs yourself so that you understand how they work and the concepts that are covered in each. This will allow you to provide meaningful hints to students who may get stuck in a lab, and it also will help guide your lecture to ensure that you cover the concepts that the labs cover.
Explain the different types of Exchange recipients. It is important that the students understand each recipient type, because creating and configuring recipients are common and fundamental tasks that Exchange administrators perform.
Consider presenting this topic in a question-and-answer format, in which you ask the students to define each type of recipient. This will help you to evaluate student knowledge, and will encourage the students to interact.
Do not spend too much time on this slide. Instead, move on to the next topic, which is a demonstration that covers many of the configuration options mentioned in this topic.
Leave the virtual machines running for subsequent demonstrations.
Preparation Steps
To perform this demonstration, ensure that the 20341B-LON-DC1, 20341B-LON-MBX1, and 20341B-LON-CAS1 virtual machines are running. Start each machine and sign in to it before starting the next virtual machine. Sign into all virtual machines using the Adatum\Administrator account with the password Pa$$w0rd.
Important: Ensure that you start your virtual machines at least ten minutes prior to conducting the demonstration.
Demonstration Steps
On LON-CAS1, in Start, click Internet Explorer and connect to https://lon-cas1.adatum.com/ecp.
Sign in as Adatum\administrator using the password Pa$$w0rd.
In the Feature pane, click recipients.
In the toolbar, click New, and then click User mailbox.
In the new user mailbox dialog box, fill in the following information:
Alias: Alice
Click New user
First name: Alice
Last name: Ciccu
Organizational unit: click browse, click Research, and then click ok.
User logon name: Alice
New password and Confirm password: Pa$$w0rd
Resource mailboxes are specific types of mailboxes that can represent meeting rooms or shared equipment, and that you can include as resources in meeting requests. Resource mailboxes have different properties associated with the mailbox than regular user mailboxes do. In addition, the Active Directory user that is associated with a resource mailbox is a disabled account.
Ask the students whether they will need to change the default settings for how resource mailboxes respond to meeting requests. In most organizations, the default settings will be acceptable for most meeting rooms, but most organizations have a few meeting rooms that have special requirements. Ask the students to provide some examples, and then consider showing the students how you could configure room mailboxes to address their scenario in the next demonstration.
Leave the virtual machines running for the subsequent demonstration.
Preparation Steps
To perform this demonstration, ensure that the 20341B-LON-DC1, 20341B-LON-MBX1, and 20341B-LON-CAS1. These should be running from the preceding demonstration. You will also need to start 20341B-LON-CL1. If necessary, sign into all servers using the Adatum\Administrator account with the password Pa$$w0rd. Do not log on to LON-CL1 until directed to do so.
Demonstration Steps
On LON-CAS1, in the EAC, on recipients, click the resources tab.
Click the drop down arrow next to New, and then click Room mailbox.
Fill in the following information:
Room name: Conference Room 1
Email address: ConferenceRoom1
Organizational unit: Click browse, click Sales, and then click ok.
Location: London
Capacity: 20
Click more options, under Mailbox database click browse, click Mailbox Database 1, and then click ok.
Click save.
On the resources tab, click Conference Room 1, and then click Edit.
Click booking options.
Change the Maximum booking lead time (days) setting to 365.
Highlight the difference between how shared mailboxes are implemented in Exchange Server 2013 compared to previous versions of Exchange. In previous versions of Exchange, you could create a mailbox and grant other users Full Access, Send As, or Send on Behalf of permissions. You could even disable the user account associated with the mailbox.
In Exchange Server 2013, the shared mailbox enables you to do exactly the same thing; the only difference is that now you can configure these settings automatically when you create the shared mailbox.
Leave all virtual machines running for subsequent demonstrations.
Preparation Steps
To perform this demonstration, ensure that the 20341B-LON-DC1, 20341B-LON-MBX1, 20341B-LON-CAS1, and 20341B-LON-CL1 virtual machines are running. If necessary, sign into all virtual machines using the Adatum\Administrator account with the password Pa$$w0rd.
Demonstration Steps
On LON-CAS1, switch to EAC.
Click the shared tab.
Click New.
Fill in the following information:
Display name: Sales Information
Email address: salesInfo
Under Full Access, click Add, click Aidan Delaney, and click add.
Click Amr Zaki, click add, and click ok.
Click more options.
Under Mailbox database, click browse, click Mailbox Database 1, and click ok.
Click save.
In Internet Explorer, connect to https://lon-cas1.adatum.com/owa.
Click new mail. Create a new message with the recipient Sales Information and the subject Information request. Send the message.
On LON-CL1, ensure that you are logged in as Aidan. Open Outlook 2013.
Consider drawing a diagram of two AD DS forests with Exchange Server 2013 deployed in one of the forests. Show the user account in the forest that does not contain Exchange Server 2013, emphasizing that the user will sign in to that forest. Show how the user is then able to connect to the linked mailbox in Exchange Server 2013.
Ask the students to describe the difference between security groups and distribution groups. Discuss the implications of mail-enabling security groups. For example, security groups can be used to provide access to network resources, so the membership of security groups is usually strictly controlled. The same groups might or might not have the right membership for email distribution.
Leave all virtual machines running for subsequent demonstrations.
Preparation Steps
To perform this demonstration, ensure that the 20341B-LON-DC1, 20341B-LON-MBX1, 20341B-LON-CAS1, and 20341B-LON-CL1 virtual machines are running. If necessary, sign into all virtual machines using the Adatum\Administrator account with the password Pa$$w0rd.
Demonstration Steps
On LON-CAS1, switch to Internet Explorer and connect to https://lon-cas1.adatum.com/ecp.
Click the groups tab.
Click the arrow next to New, and then click Distribution group.
Fill in the following information:
Display name: Sales Managers
Alias: SalesManagers
Organizational unit: Sales
Members: Bonnie Kearney, Dennis Bye
Owner approval is required: Closed
Choose whether the group is open to leave: Closed
Click save.
Double-click the Sales Managers group. Click and describe the configuration options available on the delivery management and group delegation tabs. Click cancel.
Click the drop down arrow next to New, and then click Security group.
Ask the students to provide examples of when they have implemented the delegation of group memberships. Ask them to describe the scenario, and then describe how this could be implemented by using the Exchange Server 2013 options.