1
15

cross-posted from: https://lemmy.ml/post/18154572

All our servers and company laptops went down at pretty much the same time. Laptops have been bootlooping to blue screen of death. It's all very exciting, personally, as someone not responsible for fixing it.

Apparently caused by a bad CrowdStrike update.

2
1

Came across this guide and figured I'd share. Will be testing this out later this week.

3
1
Help with AppArmor (sh.itjust.works)

Hi! I learned about AppArmor recently and I am setting up profiles for each of my applications on my server, but I'm not sure if I should also restrict python binary executable in local python environment for my django website, because AppArmor says: "is currently marked as a program that should not have its own profile.". Chat GPT says I should activate the environment, bypass the warning and create a profile, but I'm not sure, so I decided to ask if anyone knows better.

4
1

As I'm sure many others have encountered, within days of creating any user in O365, they start receiving spam, phishing, and solicitation emails. Some of these bad actors have shown a very clear pattern to me, so it leads me to believe a team of bad actors may have found access to our GAL and will make regular attempts to scam our employees. I'm of course, also curious how I might find that employees with minimal outside communications (external communications are with specific individuals at client companies.)

Unfortunately, I haven't much experience with SecOPs, so I'm curious if anyone more experienced can suggest some good tools to recommend for me to do some digging into this. Tool/app platform doesn't matter, I've got Windows, Mac, and Linux machines available to utilize for testing.

5
1
submitted 1 year ago* (last edited 1 year ago) by DarraignTheSane@lemmy.world to c/sysadmin@sh.itjust.works

Hello c/sysadmin, and welcome to the Patch Megathread! I'm editing this post and leaving it up as a single catch-all sticky post for patch days for the time being, since we're not seeing enough activity to warrant new threads IMO. If someone wants to help moderate / curate content and actively create new patch day posts, please let me know and I'll add you to the mod team.

 

This is the place to talk about the latest patches, updates, and releases. We put this thread into place to help gather all the information about this month's updates: What is fixed, what broke, what got released and should have been caught in QA, etc. We do this both to keep clutter out of the community, and provide a singular resource to read.

 

While this thread is timed to coincide with Microsoft's Patch Tuesday, feel free to discuss any patches, updates, and releases, regardless of the company or product.

 

Remember the rules of safe patching:

  • Deploy to a test/dev environment before prod.
  • Deploy to a pilot/test group before the whole org.
  • Have a plan to roll back if something doesn't work.
  • Test, test, and test!
6
1

cross-posted from: https://lemmy.world/post/104228

I setup this community specifically because of the time I've spent over the years browsing and relying on reddit.com/r/sysadmin for sources of information on tips/tricks, security exploits & patches, outages, and yes even the ranting about how our jobs all suck. (I like mine, for what it's worth.)

Come on down, ask questions, post what the sysadmin community needs to know about, or head in to get either sympathy or chastisement about why you haven't left your job yet. 🤣

Want to be a mod? Let me know!

7
1
Test (sh.itjust.works)

Please ignore

Sysadmin

391 readers
1 users here now

A community dedicated to the profession of IT Systems Administration

founded 1 year ago
MODERATORS