• 0 Posts
  • 10 Comments
Joined 1 year ago
cake
Cake day: October 29th, 2023

help-circle







  • What typically happens here is you sysprep the machine and then you would convert it to an image. In enterprise, we’d create this “golden image” and then whenever we pass automation to create a VM we specify the use of that image. Once the image is in the right state, you should be able to select that image and then say “new VM from Image” or something similar to that. I’m speaking in generic terms, but Hyper-V can do this.

    Capture image using DISM is basically how you do this when you need to do this for hardware via USB.


  • I once had a Senior Infrastructure Engineer looking at the logs of our public VPN host. A VPN host that is open to the world on 0.0.0.0/0 because that’s the requirement we had. This Engineer saw thousands of failed login attempts to the VPN; things like admin/admin admin/password1 etc. Regular internet crap, a bot will scrape the web page and try its luck then move on.

    This person then decided to initiate security breach procedure and immediately shut down the VPN, because “we’d been hacked!”.

    There’s a lot of noise on the internet. The challenge is working out the best way to isolate your resources just enough and block anything that doesn’t need access. This is why things like Web Application Firewalls exist.