Pretty sure that’s just a way to force everyone to a higher Defender license in Azure. If every other AV product can have Tamper Protection with a simple password and control through some form of management tool, it seems hypocritical that the one they supply cannot be managed through Group Policy.
Well, Onedrive should be a decision for later. Many installers do not realise this will sync files. This is a major security risk for professionals if sensitive files are being duplicated. It also breaks scripts that expect a normal path for folders.. Now we have people with 30 or 40 dummy Microsoft accounts….
You can also add an account later. The major problem is that rather than basing the home folder on the user name (Mary, John, etc.) it is based on a substring of the logon, which is a bugger to remember for RDP.
You almost never logon with the Microsoft account, it will be a device PIN. Only networking and terminal services will use that logon. Again, you guess what it is and where it truncated.
Is the user account on the CISCO device you are using have level 15 privileges? Since the error seems to be the show run command it might be the user account does not have the correct privilege to execute the show run command?
Who wants to use a GUI if you can let handly Ansible all of it and you can just leave it all for automation… GUIs are outdated….
With Ansible you can automate you’re entire IT!
e.g. with an Ansible play you take a VM, check for updates, if available you set monitoring to pause that system, then you create a VM-snap, then you update, then you reboot and finally you email out a report and activate monitoring again… and you can do a lot of this even with your firewall (palo alto e.g.) and cisco devices. If things are changed you can have ansible change it back to keep a good state… try that with WSUS….
I’ve used `cat` and `>>` to add the contents of the public key file to administrators_authorized_keys file but the contents were converted on the fly to utf16. The file looked ok in notepad but openssh could not read it. What is worse: there was no error in the logs neither on server side nor in client (`-vvv`). I’ve wasted hours on this! I’ve tried `LogLevel DEBUG` in `sshd_config` but the `__PROGRAMDATA__/ssh/logs` directory is empty.
I have used the Autoruns to delete or disable applications sparingly. Like many Sysinternals apps, it is somewhat forbidding to the average user like myself, with its many settings and functions (but useful). There are manuals which document Sysinternals, which I have, but rarely read. They are probably out of date with the many changes made to Sysinternals. Good article.
As per my experince , You mean SyncToy , the Microsoft tool , but for this comment “Try copying millions of files, possibly without keeping the same tree structure at the target as at the source, and logging errors (the most frequent being missing NTFS permissions at the source) ” , Gs Richcopy 360 and Syncback are created exactly for such cases. Backup/sync GUI tools like Gs Richcopy 360 and Syncback have a nice and simple GUI, able to copy to local drives, remote servers, LANs, WANs, and clouds, able to copy all the permissions types from source to destination, and also able to copy time stamps. and as I remember, there are options to throttle the connection speed to prevent bandwidth consumption, a feature to email you after the job is finished, an excellent task scheduler and it will never crash while transferring a large amount of data. there are also other differences between such a GUI tools and CLI tools, just try to search
Hello Sarah I too recognize that the GUI is very practical and useful … but only in certain cases: Simple and unitary tasks
For all that is complex tasks – even simple but repetitive – nothing beats the command line and the script.
you named 3 tools: SyncToy – Gs Richcopy 360 – Syncback Try copying millions of files, possibly without keeping the same tree structure at the target as at the source, and logging errors (the most frequent being missing NTFS permissions at the source), I wish you good luck with these tools.
These 3 tools are undeniably practical for personal use only and limited in volume, not for professional use.
thanks for replying. I am using the code below, which I think is identical to the one in your article. I wonder if there is any special formatting used for the devicelist textfile (I simply put each IP address on a new line) ?
# import modules needed and set up ssh connection parameters import paramiko import datetime user = ‘admin’ secret = ‘admin’ port = 22 ssh = paramiko.SSHClient() ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
# loop through device list and execute commands for ip in iplist: ipaddr = ip.strip() ssh.connect(hostname=ipaddr, username=user, password=secret, port=port) stdin, stdout, stderr = ssh.exec_command(‘show run’) list = stdout.readlines() outfile = open(outfilepath + ipaddr + “_” + time_now, “w”) for char in list: outfile.write(char) ssh.close() outfile.close()