<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Posts on MKvLab Blog</title>
    <link>https://mkvlab.at/posts/</link>
    <description>Recent content in Posts on MKvLab Blog</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Wed, 22 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://mkvlab.at/posts/feed.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>FortiOS 8.0.0 vs 7.x: What’s New, What Improved, and What I Like Most</title>
      <link>https://mkvlab.at/posts/61_fortios-8-whats-new-what-improved-and-what-i-like-most/</link>
      <pubDate>Wed, 22 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/61_fortios-8-whats-new-what-improved-and-what-i-like-most/</guid>
      <description>&lt;p&gt;FortiOS 8.0.0 which has been released yesterday, is one of the more interesting Fortinet releases in recent years. While the 7.x branch focused heavily on platform refinement, operational maturity, and steady improvements to areas such as automation, inspection, SD-WAN, and manageability, FortiOS 8.0.0 feels more forward-looking in its positioning. It is built around themes that are now shaping enterprise security discussions much more directly: AI-aware protection, stronger data loss prevention, secure networking evolution, and quantum-safe readiness.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Licensing and Registration of VCF/VVF 9.0</title>
      <link>https://mkvlab.at/posts/58_licensing-and-registration-of-vcf-vvf-9/</link>
      <pubDate>Mon, 23 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/58_licensing-and-registration-of-vcf-vvf-9/</guid>
      <description>&lt;p&gt;VMware Cloud Foundation 9.0 and VMware vSphere Foundation 9.0 introduce a centralized licensing workflow through VCF Operations, replacing much of the version-specific key handling with a more unified entitlement and usage model.&lt;/p&gt;&#xA;&lt;p&gt;VCF 9.0 supports two registration modes: &lt;strong&gt;connected&lt;/strong&gt; and &lt;strong&gt;disconnected&lt;/strong&gt;. Disconnected mode is intended for environments without internet connectivity or for fully air-gapped setups. Broadcom describes this mode as suitable for air-gapped networks, where administrators manually exchange registration, usage, and license files with the VCF Business Services portal.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Update your VMware ESXi 8.x, 9.x - Offline Mode</title>
      <link>https://mkvlab.at/posts/57_esxi8and9-update-offline/</link>
      <pubDate>Thu, 20 Nov 2025 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/57_esxi8and9-update-offline/</guid>
      <description>&lt;p&gt;In my post &lt;a href=&#34;https://mkvlab.at/how-to-update-your-vmware-esxi-6-x-offline-mode&#34;&gt;How to update your VMware ESXi 6.x, Offline Mode&lt;/a&gt;, I walked you through updating an ESXi server in offline mode using the &lt;em&gt;esxcli software vib update&lt;/em&gt; command. However, this method has been &lt;a href=&#34;https://knowledge.broadcom.com/external/article/380215&#34;&gt;deprecated beginning with ESXi 8.0 Update 2&lt;/a&gt; and replaced by profile-based update commands, which I will demonstrate in this post. Using the offline method, you can easily and efficiently update an air-gapped standalone ESXi host. Of course, for hosts managed by vCenter, updates should be performed using vLCM to automate the process through vCenter Server.&lt;/p&gt;</description>
    </item>
    <item>
      <title>FortiOS 7.6.3 – SSL VPN tunnel mode is no longer supported!</title>
      <link>https://mkvlab.at/posts/36_fortios-7-6-3-ssl-vpn-tunnel-mode-is-no-longer-supported/</link>
      <pubDate>Fri, 18 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/36_fortios-7-6-3-ssl-vpn-tunnel-mode-is-no-longer-supported/</guid>
      <description>&lt;p&gt;In a significant update, Fortinet has announced that starting with FortiOS version 7.6.3 (has been released on April 17th), SSL VPN tunnel mode is no longer supported on ALL FortiGate models. Upon upgrading to FortiOS 7.6.3, existing SSL VPN configurations will be removed, and the SSL VPN web and tunnel mode features will no longer be accessible through the GUI or CLI. Fortinet is encoureging admins to migrating to IPsec VPN before upgrade. SSLVPN web-mode which is now called “agentless VPN” is still available, but only on certain models.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Critical zero-day vulnerability in FortiManager is actively exploited – CVE-2024-47575</title>
      <link>https://mkvlab.at/posts/33_critical-zero-day-vulnerability-in-fortimanager-cve-2024-47575/</link>
      <pubDate>Sun, 27 Oct 2024 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/33_critical-zero-day-vulnerability-in-fortimanager-cve-2024-47575/</guid>
      <description>&lt;p&gt;A missing authentication for critical function vulnerability tracked as CVE-2024-47575 in FortiManager fgfmd daemon may allow a remote unauthenticated attacker to execute arbitrary code or commands via specially crafted requests. Reports have shown this vulnerability to be exploited in the wild. The company privately warned FortiManager customers about the flaw starting October 13th in advanced notification emails seen by BleepingComputer that contained steps to mitigate the flaw until a security update was released.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Redeploy NSX Edge Trasport Node using API</title>
      <link>https://mkvlab.at/posts/32_redeploy-nsx-edge-trasport-node-using-api/</link>
      <pubDate>Tue, 03 Sep 2024 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/32_redeploy-nsx-edge-trasport-node-using-api/</guid>
      <description>&lt;p&gt;In this post, we will redeploy the NSX Edge Transport Node using the NSX Manager API call where you can easily and quickly redeploy your edge node. I am in a situation, where my nodes are not responding as I am constantly testing things in my Lab, so I wanted to share how you can do that in your production environment.&lt;/p&gt;&#xA;&lt;p&gt;There are many reasons you may need to redeploy your edge node:&lt;/p&gt;</description>
    </item>
    <item>
      <title>FortiOS 7.6.0 has been released!</title>
      <link>https://mkvlab.at/posts/31_fortios-7-6-0-has-been-released/</link>
      <pubDate>Fri, 09 Aug 2024 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/31_fortios-7-6-0-has-been-released/</guid>
      <description>&lt;p&gt;Fortinet has released the new version of FortiOS 7.6.0.&lt;/p&gt;&#xA;&lt;h2 id=&#34;documentation&#34;&gt;Documentation&lt;/h2&gt;&#xA;&lt;p&gt;The release includes the main FortiOS 7.6.0 documentation set:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://docs.fortinet.com/document/fortigate/7.6.0/fortios-release-notes/760203/introduction-and-supported-models&#34;&gt;Release Notes&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://docs.fortinet.com/document/fortigate/7.6.0/new-features/770045/overview&#34;&gt;New Features&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://docs.fortinet.com/document/fortigate/7.6.0/administration-guide/954635/getting-started&#34;&gt;Administration Guide&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://docs.fortinet.com/document/fortigate/7.6.0/best-practices/587898/getting-started&#34;&gt;Best Practices&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://docs.fortinet.com/document/fortigate/7.6.0/cli-reference/84566/fortios-cli-reference&#34;&gt;CLI Reference&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://docs.fortinet.com/document/fortigate/7.6.0/fortios-release-notes/289806/resolved-issues&#34;&gt;Resolved Issues&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://docs.fortinet.com/document/fortigate/7.6.0/fortios-release-notes/236526/known-issues&#34;&gt;Known Issues&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://web.archive.org/web/20251107123124/https://docs.fortinet.com/cloud-solutions/vmware-esxi&#34;&gt;FortiOS 7.6 VMware Solution&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;supported-models&#34;&gt;Supported models&lt;/h2&gt;&#xA;&lt;p&gt;FortiOS 7.6.0 supports the following models.&lt;/p&gt;&#xA;&lt;h3 id=&#34;fortigate&#34;&gt;FortiGate&lt;/h3&gt;&#xA;&lt;p&gt;FG-40F, FG-40F-3G4G, FG-60F, FG-61F, FG-70F, FG-71F, FG-80F, FG-80F-BP, FG-80F-DSL, FG-80F-POE, FG-81F, FG-81F-POE, FG-100F, FG-101F, FG-200E, FG-200F, FG-201E, FG-201F, FG-300E, FG-301E, FG-400E, FG-400E-BP, FG-401E, FG-400F, FG-401F, FG-500E, FG-501E, FG-600E, FG-601E, FG-600F, FG-601F, FG-800D, FG-900D, FG-900G, FG-901G, FG-1000D, FG-1100E, FG-1101E, FG-1800F, FG-1801F, FG-2000E, FG-2200E, FG-2201E, FG-2500E, FG-2600F, FG-2601F, FG-3000D, FG-3000F, FG-3001F, FG-3100D, FG-3200D, FG-3200F, FG-3201F, FG-3300E, FG-3301E, FG-3400E, FG-3401E, FG-3500F, FG-3501F, FG-3600E, FG-3601E, FG-3700D, FG-3700F, FG-3701F, FG-3960E, FG-3980E, FG-4200F, FG-4201F, FG-4400F, FG-4401F, FG-4800F, FG-4801F, FG-5001E, FG-5001E1, FG-6000F, FG-7000E, FG-7000F.&lt;/p&gt;</description>
    </item>
    <item>
      <title>VMware Cloud Foundation 5.2 has been released</title>
      <link>https://mkvlab.at/posts/30_vmware-cloud-foundation-5-2-has-been-released/</link>
      <pubDate>Wed, 24 Jul 2024 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/30_vmware-cloud-foundation-5-2-has-been-released/</guid>
      <description>&lt;p&gt;VCF 5.2 has been released today!&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;What’s New&lt;/strong&gt; &lt;br&gt;&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Support for Identity Federation with Entra ID:&lt;/strong&gt; VCF users can now configure Microsoft Entra ID (formerly known as Azure AD) as an identity provider.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;APIs for Auditing PCI Compliance:&lt;/strong&gt; VCF users can now use a new set of APIs that audit VCF configuration for compliance with 9 relevant PCI-DSS controls.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;vSAN Max support:&lt;/strong&gt; vSAN Max is a disaggregated storage offering which enables petabyte scale storage-only clusters. vSAN Max is powered by ESA as the underlying storage platform, which is a high-performance file system that can scale up to high densities with no penalty to performance. ESA also provides other benefits such as built-in, efficient, scalable snapshots, and low overhead data services such as encryption and compression.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;vSAN ESA Stretched Cluster:&lt;/strong&gt; VCF users can now configure ESA Stretched Cluster in vSAN Ready Nodes. It enables customers to take the concept of fault domains to protect an environment spanning two physical sites from downtime in the event of a site failure.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;VCF Import Tool (for vSphere &amp;amp; vSAN):&lt;/strong&gt; The VCF Import Tool integrates existing vSphere environments into VMware Cloud Foundation, centralizing management and optimizing resources without needing a full rebuild.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Dual DPU Support:&lt;/strong&gt; VCF users can now leverage Dual DPU support. Dual DPU support boosts availability and performance. Active/Standby ensures continuity against failures, while dual independent DPUs double offload capacity and provide isolation.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Avi Load Balancer Integration with VCF:&lt;/strong&gt; VCF users can now deploy Avi (formerly NSX Advanced Load Balancer) as part of a new workload domain and perform password rotation and certificate management of the ALB infrastructure from SDDC Manager.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Deploying NSX as a Day-N Operation:&lt;/strong&gt; VCF users can now choose to deploy NSX (VLAN Backed) from SDDC Manager on top of a workload domain originally deployed/converted/imported with vSphere Networking.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Out of Band Changes from vCenter:&lt;/strong&gt; Out of Band changes from vCenter can be manually synced with SDDC Manager. This includes inventory changes (for example, adding a host to a cluster) and object name changes (for example, datacenter name, datastore name, port group name).&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;ESXi Live Patching:&lt;/strong&gt; VCF users can now apply ESXi security patches without requiring VM evacuation on ESXi hosts.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Flexible Target BOM for Upgrades:&lt;/strong&gt; VCF users can now create a composite and customized BOM using patches when upgrading workload domains. Customers can plan an upgrade along with patches in one orchestrated workflow instead of performing an upgrade and applying patches in separate maintenance windows.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Async Patching with SDDC Manager:&lt;/strong&gt; Customers previously used the standalone Async Patch Tool to apply patches to the VCF BOM components. VCF 5.2 provides the ability to apply BOM component patches from the SDDC Manager UI.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Day N workflows with Embedded Async Patching:&lt;/strong&gt; VCF users can now add new workload domains and clusters with patched versions of individual BOM components from SDDC Manager.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Asynchronous SDDC Manager Upgrades:&lt;/strong&gt; VCF users can now upgrade SDDC Manager independently from the rest of the BOM to apply critical fixes, security patches, and to enable specific features related to SDDC Manager.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Authenticated Proxy:&lt;/strong&gt; VCF users can now  use proxy authentication from SDDC Manager to enable secure connectivity from SDDC Manager to the internet.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Offline Depot:&lt;/strong&gt; VCF users can now perform lifecycle bundle downloads in offline/air-gapped environments in a simplified manner. The offline depot downloads and stages VCF SDDC Manager and BOM component bundles and enables customers to configure SDDC Manager to download the bundles directly from the offline depot.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Isolated Workload Domains Sharing NSX:&lt;/strong&gt; VCF users can now create and manage isolated workload domains that can share an NSX Manager instance between them.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Language support:&lt;/strong&gt; Beginning with the next major release, VCF will be supporting the following localization languages:&#xA;&lt;ul&gt;&#xA;&lt;li&gt;English&lt;/li&gt;&#xA;&lt;li&gt;Japanese&lt;/li&gt;&#xA;&lt;li&gt;Spanish&lt;/li&gt;&#xA;&lt;li&gt;French&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;VMware Cloud Foundation Bill of Materials (BOM)&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>VMware Cloud Foundation on my Lab</title>
      <link>https://mkvlab.at/posts/29_vmware-cloud-foundation-on-my-lab/</link>
      <pubDate>Sat, 20 Jul 2024 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/29_vmware-cloud-foundation-on-my-lab/</guid>
      <description>&lt;p&gt;I am writing this article because I had trouble understanding the best way to deploy VMware Cloud Foundation (VCF) in a lab environment, given our limited resources and the high demands of VCF. For example, using the VCF Holodeck Toolkit requires 384 GB of RAM, which is beyond our current capacity. To address this issue, I searched for ways to reduce the resource requirements. I found that consolidating the NSX Manager from three instances to one and reducing the management workload cluster from a minimum of four hosts to just one can significantly lower the needed resources.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Renew NSX Internal Self-Signed Certificates</title>
      <link>https://mkvlab.at/posts/28_renew-nsx-internal-self-signed-certificates/</link>
      <pubDate>Fri, 12 Jul 2024 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/28_renew-nsx-internal-self-signed-certificates/</guid>
      <description>&lt;p&gt;Once you have installed the NSX Manager, the internal self-sign certificate will be generated and configured with different services like the manager web console. These certificates have a lifetime and will expire one day, so we need to renew the certificates and we are going to renew the self-sign certificates. One important aspect of this is ensuring that the self-signed certificates are up-to-date. Self-signed certificates, while not as robust as those issued by a Certificate Authority (CA), are often used in internal networks for ease of setup and management. I will write another blog post to show how to generate a request sign the certificate in PKI and import and apply to services. In this blog post, I will walk you through the process of renewing the NSX self-signed certificate. This process is relatively straightforward, but it is essential to follow each step carefully to avoid disruptions in your network services.&lt;/p&gt;</description>
    </item>
    <item>
      <title>NSX Training | Segment DHCP Server</title>
      <link>https://mkvlab.at/posts/27_nsx-training-segment-dhcp-server/</link>
      <pubDate>Mon, 13 May 2024 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/27_nsx-training-segment-dhcp-server/</guid>
      <description>&lt;p&gt;Today, I&amp;rsquo;m excited to share a new tutorial video that I’ve created, which walks you through the process of configuring a Segment DHCP server in VMware NSX.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Why Configure a DHCP Server in VMware NSX?&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;Dynamic Host Configuration Protocol (DHCP) is crucial for automating IP address allocation and management in a network. By configuring a DHCP server within VMware NSX, you can efficiently manage IP addresses within your virtualized network segments, improving both performance and scalability.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Change NSX User Password with API</title>
      <link>https://mkvlab.at/posts/26_change-nsx-user-password-with-api/</link>
      <pubDate>Fri, 10 May 2024 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/26_change-nsx-user-password-with-api/</guid>
      <description>&lt;p&gt;In this article, I am going to show how to change the NSX user password in different ways, but specifically using the API.&lt;/p&gt;&#xA;&lt;p&gt;You will need your API tool, here I am going to use &lt;a href=&#34;https://www.postman.com/&#34;&gt;Postman&lt;/a&gt; to explore and send API requests to the NSX Manager.&lt;/p&gt;&#xA;&lt;p&gt;But first I would like to take a moment and show 2 other ways to change the password.&lt;/p&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&lt;strong&gt;Using Alarm in NSX Manager UI.&lt;/strong&gt;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&#xA;&#xA;  &lt;img src=&#34;https://mkvlab.at/images/2024/05/26_1.png&#34; style=&#34;max-width: 100%; height: auto;&#34; alt=&#34;NSX screenshot&#34;&gt;&#xA;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Exchange Server 2019 and 2016 Hotfix Update</title>
      <link>https://mkvlab.at/posts/25-1_exchange-server-2019-and-2016-hotfix-update/</link>
      <pubDate>Tue, 23 Apr 2024 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/25-1_exchange-server-2019-and-2016-hotfix-update/</guid>
      <description>&lt;p&gt;Microsoft released a hotfix for Exchange Server 2016 and 2019 which includes some &lt;a href=&#34;https://support.microsoft.com/en-us/topic/hotfix-update-for-exchange-server-2019-and-2016-april-23-2024-kb5037224-35eddea8-4828-4e38-b462-db89ea1100c9&#34;&gt;fixes&lt;/a&gt; but most importantly includes a very important feature, &lt;a href=&#34;https://learn.microsoft.com/en-us/microsoft-365/enterprise/configure-exchange-server-for-hybrid-modern-authentication?view=o365-worldwide#enable-hybrid-modern-authentication-for-owa-and-ecp&#34;&gt;Hybrid Modern Authentication support for OWA and ECP in Exchange Server 2019 CU14&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;in this &lt;a href=&#34;https://support.microsoft.com/en-us/topic/hotfix-update-for-exchange-server-2019-and-2016-april-23-2024-kb5037224-35eddea8-4828-4e38-b462-db89ea1100c9&#34;&gt;link&lt;/a&gt;, you find the Microsoft original KB regarding the hotfix and some useful information.&lt;/p&gt;&#xA;&lt;p&gt;Exchange 2019 CU14 HU2  | 15.02.1544.011 | &lt;a href=&#34;https://www.microsoft.com/download/details.aspx?familyID=11b316cf-c030-43e0-9a09-2717bb9630c5&#34;&gt;Download&lt;/a&gt;&lt;br&gt;&#xA;Exchange 2019 CU13 HU6  | 15.02.1258.034 | &lt;a href=&#34;https://www.microsoft.com/download/details.aspx?familyID=8c2c81e5-fc91-4ee6-bc5f-ed5d1a423017&#34;&gt;Download&lt;/a&gt;&lt;br&gt;&#xA;Exchange 2016 CU23 HU13 | 15.01.2507.039 | &lt;a href=&#34;https://www.microsoft.com/download/details.aspx?familyID=db6d864f-8ac9-44f0-bb05-45e1ef6fced4&#34;&gt;Download&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;This update is also available through Windows Update as an Optional update.&lt;/p&gt;</description>
    </item>
    <item>
      <title>NSX Training | Deploying NSX Manager</title>
      <link>https://mkvlab.at/posts/25_nsx-training-deploying-nsx-manager/</link>
      <pubDate>Sat, 20 Apr 2024 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/25_nsx-training-deploying-nsx-manager/</guid>
      <description>&lt;p&gt;In this video, I am going to demonstrate how to deploy the NSX Manager and some tricks to reduce the RAM and CPU usage in your Home Lab.&lt;/p&gt;&#xA;&lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/OCE2nTbNDKg?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;</description>
    </item>
    <item>
      <title>Multiple FortiOS Firmware Patches have been released</title>
      <link>https://mkvlab.at/posts/24_multiple-fortios-have-been-released/</link>
      <pubDate>Wed, 07 Feb 2024 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/24_multiple-fortios-have-been-released/</guid>
      <description>&lt;p&gt;Fortinet has released multiple FortiOS firmware patches today 07.02.2024. You find the link to the released note as well as known issues and resolved issues. For the download, you will need the Fortinet Support Portal access.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;&lt;strong&gt;FortiOS 7.4.3 build 2573&lt;/strong&gt; | &lt;a href=&#34;https://docs.fortinet.com/document/fortigate/7.4.3/fortios-release-notes/760203&#34;&gt;Release Note&lt;/a&gt; | Resolved issues | &lt;a href=&#34;https://docs.fortinet.com/document/fortigate/7.4.3/fortios-release-notes/236526/known-issues&#34;&gt;Known issues&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;FortiOS 7.2.7 build 1577&lt;/strong&gt; | &lt;a href=&#34;https://docs.fortinet.com/document/fortigate/7.2.7/fortios-release-notes/760203/introduction-and-supported-models&#34;&gt;Release Note&lt;/a&gt; | Resolved issues | &lt;a href=&#34;https://docs.fortinet.com/document/fortigate/7.2.7/fortios-release-notes/236526/known-issues&#34;&gt;Known issues&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;FortiOS 6.4.15 build 2095&lt;/strong&gt; | &lt;a href=&#34;https://docs.fortinet.com/document/fortigate/6.4.15/fortios-release-notes/760203&#34;&gt;Release Note&lt;/a&gt; | &lt;a href=&#34;https://docs.fortinet.com/document/fortigate/6.4.15/fortios-release-notes/289806/resolved-issues&#34;&gt;Resolved issues&lt;/a&gt; | &lt;a href=&#34;https://docs.fortinet.com/document/fortigate/6.4.15/fortios-release-notes/236526/known-issues&#34;&gt;Known issues&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;FortiOS 6.2.16 build 1392&lt;/strong&gt; | &lt;a href=&#34;https://docs.fortinet.com/document/fortigate/6.2.16/fortios-release-notes/760203/introduction-and-supported-models&#34;&gt;Release Note&lt;/a&gt; | &lt;a href=&#34;https://docs.fortinet.com/document/fortigate/6.2.16/fortios-release-notes/289806/resolved-issues&#34;&gt;Resolved issues&lt;/a&gt; | &lt;a href=&#34;https://docs.fortinet.com/document/fortigate/6.2.16/fortios-release-notes/236526/known-issues&#34;&gt;Known issues&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>VMSA-2024-0002 - VMware Aria Operations for Networks - Multiple Vulnerabilities</title>
      <link>https://mkvlab.at/posts/23_vmsa-2024-0002-vmware-aria-operations-for-networks-multiple-vulnerabilities/</link>
      <pubDate>Wed, 07 Feb 2024 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/23_vmsa-2024-0002-vmware-aria-operations-for-networks-multiple-vulnerabilities/</guid>
      <description>&lt;p&gt;Multiple vulnerabilities in Aria Operations for Networks were responsibly reported to VMware. Updates are available to remediate these vulnerabilities in affected VMware products.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;CVE(s):&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;CVE-2024-22237, CVE-2024-22238, CVE-2024-22239, CVE-2024-22240, CVE-2024-22241&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Impacted Products:&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;VMware Aria Operations for Networks (formerly vRealize Network Insight)&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Local Privilege Escalation Vulnerability (CVE-2024-22237)&lt;/strong&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;: Aria Operations for Networks contains a local privilege escalation vulnerability. VMware has evaluated the severity of this issue to be in the &lt;a href=&#34;https://www.vmware.com/support/policies/security_response.html&#34;&gt;Important severity range&lt;/a&gt; with a maximum CVSSv3 base score of &lt;a href=&#34;https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&#34;&gt;7.8&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>VMware Fusion 13 is GA - Install Windows 11 on M1/M2 Mac using VMware Fusion</title>
      <link>https://mkvlab.at/posts/22_vmware-fusion-13-is-ga-install-windows-11-on-m1-m2-mac-using-vmware-fusion/</link>
      <pubDate>Sun, 27 Nov 2022 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/22_vmware-fusion-13-is-ga-install-windows-11-on-m1-m2-mac-using-vmware-fusion/</guid>
      <description>&lt;p&gt;There is no doubt that VMware Fusion is one of the best (if not the best) hypervisor software to run macOS, Windows, Linux, and other x86-based operating systems as virtual machines on your Mac computer. Recently VMware released version 13 of the product to support the Intel or Apple Silicon Mac. This means now they are supporting Microsoft Windows 11 and now you should be able to run it on your M1/M2 Mac using macOS 12 Monterey and macOS 13 Ventura.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Windows 365</title>
      <link>https://mkvlab.at/posts/21_windows-365/</link>
      <pubDate>Fri, 20 Aug 2021 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/21_windows-365/</guid>
      <description>&lt;p&gt;&lt;em&gt;Windows 365&lt;/em&gt; combines the power and security of the cloud with the versatility and simplicity of the PC.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Introducing Windows 365&lt;/strong&gt;&#xA;&lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/qKG8r1NERl4?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Windows 365, your Cloud PC | What it is, how it works, and how to set it up&lt;/strong&gt;&#xA;&lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;&#xA;      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/V14Ia2uwrtk?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;&#xA;    &lt;/div&gt;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>PrintNightmare - Print Spooler Remote Code Execution Vulnerability</title>
      <link>https://mkvlab.at/posts/20_printnightmare-print-spooler-remote-code-execution-vulnerability/</link>
      <pubDate>Fri, 02 Jul 2021 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/20_printnightmare-print-spooler-remote-code-execution-vulnerability/</guid>
      <description>&lt;p&gt;&lt;strong&gt;All Windows systems are vulnerable!!!&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;Microsoft (01.07.2021) has &lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527&#34;&gt;published&lt;/a&gt; the information related to  remote code execution vulnerability that affects Windows Print Spooler and has assigned CVE-2021-34527 to this vulnerability -nicknamed PrintNightmare-. A remote code execution vulnerability exists when the Windows Print Spooler service is improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security Update Exchange Server 2013-2019 | Pwn2Own Vulnerability</title>
      <link>https://mkvlab.at/posts/19_security-update-exchange-server-2013-2019/</link>
      <pubDate>Wed, 14 Apr 2021 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/19_security-update-exchange-server-2013-2019/</guid>
      <description>&lt;p&gt;Microsoft has released critical security update -April 2021- for on-premises Exchange Servers 2013, 2016 and 2019 to fix the following Remote Code Execution vulnerabilities:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2021-28480&#34;&gt;CVE-2021-28480 | Microsoft Exchange Server Remote Code Execution Vulnerability&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2021-28481&#34;&gt;CVE-2021-28481 | Microsoft Exchange Server Remote Code Execution Vulnerability&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2021-28482&#34;&gt;CVE-2021-28482 | Microsoft Exchange Server Remote Code Execution Vulnerability&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2021-28483&#34;&gt;CVE-2021-28483 | Microsoft Exchange Server Remote Code Execution Vulnerability&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;More details: &lt;a href=&#34;https://msrc.microsoft.com/update-guide/releaseNote/2021-Apr&#34;&gt;Microsoft April 2021 Security Update Summary&lt;/a&gt; and &lt;a href=&#34;https://techcommunity.microsoft.com/t5/exchange-team-blog/released-april-2021-exchange-server-security-updates/ba-p/2254617&#34;&gt;Exchange Team Blog&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Commands i use on my Mac</title>
      <link>https://mkvlab.at/posts/18_commands-i-use-on-my-mac/</link>
      <pubDate>Wed, 17 Mar 2021 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/18_commands-i-use-on-my-mac/</guid>
      <description>&lt;p&gt;dig Tool&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;dig &amp;lt;host.doamin&amp;gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;dig &amp;lt;domain&amp;gt; TXT&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;dig &amp;lt;domain&amp;gt; MX&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;dig &amp;lt;domain&amp;gt; NS&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Check the record from specific DNS Server&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;dig @9.9.9.9 &amp;lt;host.domain&amp;gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Check Open Ports&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;curl -v mail.test.com:22&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;nc -vz 192.168.13.4 &lt;span style=&#34;color:#ae81ff&#34;&gt;25&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;OPENSSL&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;openssl s_client -connect &amp;lt;serveFQDN&amp;gt;:443 -showcerts&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Console on my Mac&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ls /dev/*usb*&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;screen &amp;lt;/dev/NAME&amp;gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;9600&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;TCP dump&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;sudo tcpdump -n icmp&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;What is My IP&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;curl http://ifconfig.co&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;curl http://ifconfig.co/country&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Speed Test&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;curl -s https://raw.githubusercontent.com/sivel/speedtest-cli/master/speedtest.py | python -&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;curl -s https://raw.githubusercontent.com/khodaeifard/speedtest/master/speedtest.py | python -&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;</description>
    </item>
    <item>
      <title>PowerShell Command-Line</title>
      <link>https://mkvlab.at/posts/17_powershell-command-line/</link>
      <pubDate>Thu, 11 Mar 2021 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/17_powershell-command-line/</guid>
      <description>&lt;h2 id=&#34;active-directory&#34;&gt;Active Directory&lt;/h2&gt;&#xA;&lt;p&gt;Export All AD Users to CSV:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Get-ADUser -Filter * -Properties * | Select-Object name, mail, LastLogonDate, WhenCreated | export-csv -path c:&lt;span style=&#34;color:#ae81ff&#34;&gt;\u&lt;/span&gt;serexport.csv&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Get AD User Properties:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Get-ADUser -Identity &amp;lt;ACCOUNT&amp;gt; -Properties *&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Get all GPOs and their creation time:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;DSQuery * -Filter “&lt;span style=&#34;color:#f92672&#34;&gt;(&lt;/span&gt;ObjectCategory&lt;span style=&#34;color:#f92672&#34;&gt;=&lt;/span&gt;GroupPolicyContainer&lt;span style=&#34;color:#f92672&#34;&gt;)&lt;/span&gt;” –attr DisplayName WhenCreated&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;hyper-v&#34;&gt;Hyper-V&lt;/h2&gt;&#xA;&lt;p&gt;Get Snapshot on VM:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Get-VMSnapshot -VMName &amp;lt;NAME&amp;gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Get-VMSnapshot -ComputerName &amp;lt;NAME-OF-COMPUTER&amp;gt; -VMName &amp;lt;VM-NAME&amp;gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Delete VM Snapshot:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;Get-VMSnapshot -VMName &amp;lt;VM-NAME&amp;gt; | Remove-VMSnapshot&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;office-365&#34;&gt;Office 365&lt;/h2&gt;&#xA;&lt;p&gt;Connect to Tenant:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Exchange Servers 0-day exploits -HAFNIUM-</title>
      <link>https://mkvlab.at/posts/15_exchange-servers-0-day-exploits-hafnium/</link>
      <pubDate>Sun, 07 Mar 2021 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/15_exchange-servers-0-day-exploits-hafnium/</guid>
      <description>&lt;p&gt;On March 2, 2021 Microsoft has released several security update for Microsoft Exchange Server to address the vulnerabilities that has beed exposed targeting on-premises version of Exchange server. Microsoft has categorised this as a critical vulnerabilities and recommended the update the Exchange Server as soon as possible.&lt;/p&gt;&#xA;&lt;p&gt;The Exchange versions affected are:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Microsoft Exchange Server 2013&lt;/li&gt;&#xA;&lt;li&gt;Microsoft Exchange Server 2016&lt;/li&gt;&#xA;&lt;li&gt;Microsoft Exchange Server 2019&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;strong&gt;NOTE: Exchange Online is not affected&lt;/strong&gt;. also Microsoft Exchange Server 2010 is being updated for Defense in Depth purposes.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to set up SPF, DKIM, and DMARC records for Microsoft Office 365</title>
      <link>https://mkvlab.at/posts/16_how-to-set-up-spf-dkim-and-dmarc-records-for-microsoft-office-365/</link>
      <pubDate>Sun, 07 Mar 2021 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/16_how-to-set-up-spf-dkim-and-dmarc-records-for-microsoft-office-365/</guid>
      <description>&lt;p&gt;In this particular post i would like to talk about 3 very important DNS records for any mail server and in this individual case Office 365. SPF, DKIM and DMARC are ways to authenticate your mail server and to prove to the world, and other receiving mail servers that senders are truly authorised to send email and when properly set up, all three prove that the sender is legitimate, that their identity has not been compromised and that they’re not sending email on behalf of someone else.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Fortigate - I see only &#39;Default&#39; Security Profile</title>
      <link>https://mkvlab.at/posts/14_fortigate-i-see-only-default-security-profile/</link>
      <pubDate>Sat, 05 Dec 2020 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/14_fortigate-i-see-only-default-security-profile/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;I have came across this issue years ago but recently due to unit upgrades for our customers Fortigate firewalls i have seen it more often and also asked by customers and colleagues. said why not i just blog it maybe it will be useful for someone else as well.&lt;/p&gt;&#xA;&lt;p&gt;So the problem is sometimes we do see only the Fortigate Default UTM profile in the FortiOS user interface and the default ones can be assign to firewall policy. we can always modify profiles and assign them to firewall policies using command line but it is convenient if we can see then and edit them in graphical interface.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Check SHA1 and MD5 Hash on your Mac</title>
      <link>https://mkvlab.at/posts/13_check-sha1-and-md5-hash-on-your-mac/</link>
      <pubDate>Wed, 21 Jun 2017 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/13_check-sha1-and-md5-hash-on-your-mac/</guid>
      <description>&lt;p&gt;SHA hashing is frequently used with distribution control systems to determine revisions and to check data integrity by detecting file corruption or tampering. For common usage, a SHA checksum provides a string that can be used to verify a file been transferred as intended. If SHA checksums match, the files integrity has been maintained.&lt;/p&gt;&#xA;&lt;p&gt;Using SHA1 hash strings are also an easy way to verify file transfers from peer to peer networks and to make sure a download has finished, or that a file was not tampered with somewhere along the line. By knowing the origin SHA1 checksum, you can verify your version of the file(s) in question matches, and determine if the file is indeed valid and has arrived as intended.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to View SSL Certificate Details on Chrome</title>
      <link>https://mkvlab.at/posts/12_how-to-view-ssl-certificate-details-on-chrome/</link>
      <pubDate>Tue, 07 Mar 2017 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/12_how-to-view-ssl-certificate-details-on-chrome/</guid>
      <description>&lt;p&gt;Probably all of you know what the SSL certificate is and how this SSL certificate helps us to have a secure connection (HTTPS) with websites by now. this day&amp;rsquo;s everyone looks at the beautiful green padlock next to the website address to make sure that he or she has secure and trusted connection. I just always like to see this little green sign.&lt;/p&gt;&#xA;&lt;p&gt;by clicking this green padlock you will see the certificate details. that helps admins a lot, trusted domain, issue authority, expire date and &amp;hellip; are some of this information.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Fix a Failed Database Content Index for Exchange Server 2013</title>
      <link>https://mkvlab.at/posts/11_how-to-fix-a-failed-database-content-index-for-exchange-server-2013/</link>
      <pubDate>Mon, 06 Mar 2017 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/11_how-to-fix-a-failed-database-content-index-for-exchange-server-2013/</guid>
      <description>&lt;p&gt;Last week I was facing the problem that user of exchange server 2013 couldn’t search mail or contact in outlook. I had the same problem before, the reason is damaged index! We have to repair the index file, therefore, exchange server able to search throw the contact.&lt;/p&gt;&#xA;&lt;p&gt;That is not a big operation and also no needs to have downtime and you can do it during server usage without any side effect, well you have to stop exchange search service but as far as your client cannot search anyway there is no side effect. This exchange server is not the member of DAG or Database Availability Group.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to update your VMware ESXi 6.x, Offline Mode</title>
      <link>https://mkvlab.at/posts/10_how-to-update-your-vmware-esxi-6-x-offline-mode/</link>
      <pubDate>Sun, 26 Feb 2017 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/10_how-to-update-your-vmware-esxi-6-x-offline-mode/</guid>
      <description>&lt;p&gt;I have talked about how to update ESXi hypervisor in online mode in my &lt;a href=&#34;https://mkvlab.com/how-to-update-your-vmware-esxi-6-x-to-6-5-0a-online-mode&#34;&gt;past article&lt;/a&gt;. And I said that I will write a post about updating ESXi host in offline mode. So, there we go!&lt;/p&gt;&#xA;&lt;p&gt;But first of all, answer the question:&lt;/p&gt;&#xA;&lt;p&gt;Why do we need to use offline mode when we can update in the online mode very easy?&lt;/p&gt;&#xA;&lt;p&gt;And the answer is:&lt;/p&gt;&#xA;&lt;p&gt;There are many reasons, but most frequently reason is sometimes our host has no internet access! And we cannot use online mode.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Fortinet Command Line Portal</title>
      <link>https://mkvlab.at/posts/09_fortinet-command-line-portal/</link>
      <pubDate>Sun, 19 Feb 2017 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/09_fortinet-command-line-portal/</guid>
      <description>&lt;p&gt;Always having official and thorough reference is handy for admins. we do spend so much time to find the complete reference of commands and options to configure or troubleshoot or device other than their brands, currently, I am involved mostly with networks that equipped with Fortinet devices and need to find appropriate and fast command and options for doing my everyday job. Fortinet has great reference resources as well as community and I would say excellent support. recently they just announced &lt;a href=&#34;http://cli.fortinet.com/&#34;&gt;CLI portal&lt;/a&gt; which is great idea, simple and integrated interface to find commands. currently, they are running BETA version and also available only for FortiOS 5.4 and I would say not complete resource but I&amp;rsquo;m pretty sure during the month ahead they will continue to work and publish more stuff. I really like the idea.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Add New Disk and Partition to Your Linux Server</title>
      <link>https://mkvlab.at/posts/08_add-new-disk-and-partition-to-your-linux-server/</link>
      <pubDate>Fri, 17 Feb 2017 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/08_add-new-disk-and-partition-to-your-linux-server/</guid>
      <description>&lt;p&gt;Today I would like to share with you very easy steps to add a new disk to your existing Linux server which often requires.&lt;/p&gt;&#xA;&lt;p&gt;In this post, I would like to talk about local disk and in another post, I will talk about NFS partitions and how to add them into your Linux box.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Current partition status:&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;Okay, if you would like to see what is your box partitions status you can find out with the command:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to update your VMware ESXi 6.x, Online Mode</title>
      <link>https://mkvlab.at/posts/07_how-to-update-your-vmware-esxi-6-x-to-6-5-0a-online-mode/</link>
      <pubDate>Fri, 10 Feb 2017 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/07_how-to-update-your-vmware-esxi-6-x-to-6-5-0a-online-mode/</guid>
      <description>&lt;p&gt;Today I would like to show you how to easily update your VMware ESXi 6.x to latest version using online repository. I am going to update my ESXi host to current latest version which is 6.5.01, you can read the &lt;a href=&#34;http://pubs.vmware.com/Release_Notes/en/vsphere/65/vsphere-esxi-650a-release-notes.html#resolvedissues&#34;&gt;VMware ESXi 6.5.0a Released Noted from here&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Also, you can see the &lt;a href=&#34;https://esxi-patches.v-front.de/ESXi-6.5.0.html&#34;&gt;ESXi Version 6.5.0 History&lt;/a&gt; to get more information about all releases in the future.&lt;/p&gt;&#xA;&lt;figure&gt;&lt;img src=&#34;https://mkvlab.at/images/2017/02/07_1.png?w=1024&#34;&gt;&#xA;&lt;/figure&gt;&#xA;&#xA;&lt;p&gt;Basically, there is 2 way to update your ESXi host:&lt;/p&gt;</description>
    </item>
    <item>
      <title>SSH to Linux Server Without Password Using SSH Key-Pair</title>
      <link>https://mkvlab.at/posts/06_ssh-to-linux-machine-without-password/</link>
      <pubDate>Mon, 06 Feb 2017 00:00:00 +0000</pubDate>
      <guid>https://mkvlab.at/posts/06_ssh-to-linux-machine-without-password/</guid>
      <description>&lt;p&gt;The SSH public-private key pair allows you to securely log into AST&amp;rsquo;s servers and perform authentication, without having to specify a password using the public key. It also allows you to send files via an encrypted network connection. You can add as many key pairs as you. all pairs are independent and each computer only has information regarding its own pair. you can easily transfer your client machine public RSA key to your Linux box and then the world will be nicer for you.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
