微软Azure订阅如何添加超级协助管理账号 - 如有乐享
微软Azure订阅如何添加超级协助管理账号 - 如有乐享
本文介绍了在微软Azure订阅中添加超级协助管理账号的步骤。通过添加协管账号可以降低账号订阅被封的概率,提供超管账号被封或者忘记密码的补救方案,并管理某些服务如OpenAI模型。需要一个有效订阅的Azure和一个被邀请的微软账号。步骤包括访问订阅详情,添加角色分配,选择特权管理角色和所有者,选择成员,设置条件,最后确认邀请并使用被邀请账号登录Azure控制面板。
ired.team 红队笔记 渗透测试备忘单
ired.team 红队笔记 渗透测试备忘单
这篇文章是关于渗透测试备忘单和红队笔记的。它包含了各种命令和技术,如检查Powershell日志记录、检查WinEvent日志中的SecureString泄露、审计政策、检查LSASS是否在PPL中运行等。此外,还包括了一些利用技术,如二进制利用、破解ZIP密码、设置简单的HTTP服务器等。文章还提供了一些有用的命令和工具,如MySQL用户定义功能提权、Docker权限提升、重置root密码等。最后,还提供了一些网络工具和技术,如端口转发、SSH隧道、文件传输协议等。
ChatGPTNextWeb/ChatGPT-Next-Web: A cross-platform ChatGPT/Gemini UI (Web / PWA / Linux / Win / MacOS). 一键拥有你自己的跨平台 ChatGPT/Gemini 应用。
ChatGPTNextWeb/ChatGPT-Next-Web: A cross-platform ChatGPT/Gemini UI (Web / PWA / Linux / Win / MacOS). 一键拥有你自己的跨平台 ChatGPT/Gemini 应用。
ChatGPT Next Web is a cross-platform ChatGPT/Gemini UI that allows users to deploy a well-designed ChatGPT web UI with support for GPT3, GPT4, and Gemini Pro models. It offers features such as one-click deployment, compact client for Linux/Windows/MacOS, compatibility with self-deployed LLMs, privacy-first data storage, markdown support, responsive design, and support for multiple languages. The roadmap includes features like system prompts, user prompts, prompt templates, image sharing, desktop app with Tauri, self-hosted models, and plugins. The project provides documentation, FAQs, and instructions for development and deployment.
Use Azure Automation and PowerShell to Create a Daily Microsoft Entra Risk Report | Practical365
Use Azure Automation and PowerShell to Create a Daily Microsoft Entra Risk Report | Practical365
This article explains how to use Azure Automation and PowerShell to create a daily Microsoft Entra risk report. By automating the process, administrators can monitor risk events, gather data, format it into an HTML report, and send it via email. The report includes information on risk detections, risky users, and risky service principals, providing visibility into identity-based attacks and allowing for timely action. The article provides step-by-step instructions on setting up the Azure Automation account, assigning necessary permissions, installing required Microsoft Graph PowerShell SDK modules, adding the code, reviewing the report, and scheduling the script to run daily.
Automated Alerts on Azure (Entra ID) Application Secret Expirations - The Lazy Administrator
Automated Alerts on Azure (Entra ID) Application Secret Expirations - The Lazy Administrator
This article provides a guide on using Azure to automate alerts for Azure (Entra ID) application secret expirations. It covers creating a new Azure application, assigning permissions, creating an app secret, connecting to the Microsoft Graph API, retrieving application information, handling pagination, getting application secret expiration, converting time to local time zone, dealing with multiple secrets per application, sending alerts via email and Microsoft Teams, and setting up automatic serverless automation using PowerShell runbooks and schedules.
Build DMZ in Azure Cloud | Blog by Raihan Al-Beruni
Build DMZ in Azure Cloud | Blog by Raihan Al-Beruni
This blog post discusses how to build a DMZ (Demilitarized Zone) in Azure Cloud. It explains the concept of a DMZ, the architecture with two or three layers of security, and workload placement. It also provides examples of address spacing and hybrid network workloads placement. The post concludes with best practices for Azure networking, including segmenting networks, controlling traffic with NSGs, and enforcing user-defined rules.
Best practices for network security - Microsoft Azure | Microsoft Learn
Best practices for network security - Microsoft Azure | Microsoft Learn
This document provides best practices for network security in Microsoft Azure. It emphasizes the importance of adopting Zero Trust architectures, implementing conditional access policies, enabling port access only after workflow approval, and granting temporary permissions for privileged tasks. The document also recommends controlling routing behavior, using virtual network appliances, deploying perimeter networks for security zones, avoiding exposure to the internet with dedicated WAN links, optimizing uptime and performance with load balancing, disabling RDP/SSH access to virtual machines, and securing critical Azure service resources with Azure Private Link. Additional information on control routing behavior, virtual network appliances, perimeter networks, WAN links, load balancing, RDP/SSH access, and Azure Private Link is provided. The document concludes with a reference to Azure security best practices and patterns.
How To Setup A L2TP/SSTP Client Access RRaS Server In Azure ~ Bauer-Power Media
How To Setup A L2TP/SSTP Client Access RRaS Server In Azure ~ Bauer-Power Media
This post explains how to set up a L2TP/SSTP client access RRaS server in Azure. Although RRaS is not officially supported in Azure, it can still be configured by enabling IP forwarding on the VM and adding a routing table to the vnet. The post provides step-by-step instructions on installing the Remote Access role, configuring and enabling RRaS, and setting up NAT for the VPN tunnel. It also mentions the need to assign IP addresses from a static pool and configure SSL certificate and authentication. The post concludes by inviting readers to share their experiences and alternative methods in the comments.
TheMediocreCoder/Sync-CyberArk-Password-Azure-KeyVault-Secret: Push / Update CyberArk Passwords to Azure Key Vault
TheMediocreCoder/Sync-CyberArk-Password-Azure-KeyVault-Secret: Push / Update CyberArk Passwords to Azure Key Vault
This document provides information about the Sync-CyberArk-Password-Azure-KeyVault-Secret plugin, which allows for pushing, updating, and syncing passwords from CyberArk Vault to Azure Key Vault. It includes prerequisites, configuration steps, and instructions for adding Azure Key Vault usage. The document also explains how to add KeyVaultName and SecretName File Categories in Vault Server and create a new service account platform. Additionally, it covers the process of adding Azure Key Vault usage and testing the push/update operation.