What Are You Doing Right Now
-
Just ordered a Plamrest Keyboard unit for a HP laptop.
-
Planning a "Move" of a VM from a Datto device back to production servers
-
Just found out that my interview will run on Fox 4 News today here in Dallas.
-
Just got tickets to see Primus in June - they will be playing the entire "A Farewell to Kings" album by Rush. And one of the opening bands is The Sword, who are amazing.
-
Slow day on ML!
-
Trying to wrap my brain around adding a CA to our domain so we can encrypt traffic between servers. OMG... Where do I start....
-
@popester said in What Are You Doing Right Now:
Trying to wrap my brain around adding a CA to our domain so we can encrypt traffic between servers. OMG... Where do I start....
For AD, I assume?
-
@scottalanmiller said in What Are You Doing Right Now:
@popester said in What Are You Doing Right Now:
Trying to wrap my brain around adding a CA to our domain so we can encrypt traffic between servers. OMG... Where do I start....
For AD, I assume?
Yes sir. What brought it about was we run Citrix xenapp and nothing is encrypted this side of the ADC
-
@popester said in What Are You Doing Right Now:
@scottalanmiller said in What Are You Doing Right Now:
@popester said in What Are You Doing Right Now:
Trying to wrap my brain around adding a CA to our domain so we can encrypt traffic between servers. OMG... Where do I start....
For AD, I assume?
Yes sir. What brought it about was we run Citrix xenapp and nothing is encrypted this side of the ADC
Well, the passwords are. That's the only important bit in a typical domain communications chain. Not to belittle "encrypt everything", because that's a good idea in general. Just saying that AD is decently secure even when at its least secure.
-
@scottalanmiller
I just asked the reason behind it and "Mind Blown" because we have a consultant that is working on stuff already and is willing to do it. Along with it being best practice. So now comes the fun, learning how not to break it.This was not a "Norm" response to my question.
-
@popester said in What Are You Doing Right Now:
@scottalanmiller
I just asked the reason behind it and "Mind Blown" because we have a consultant that is working on stuff already and is willing to do it. Along with it being best practice. So now comes the fun, learning how not to break it.This was not a "Norm" response to my question.
Set the Certificates for as long as your CA will allow, lol.
-
@scottalanmiller said in What Are You Doing Right Now:
@popester said in What Are You Doing Right Now:
@scottalanmiller said in What Are You Doing Right Now:
@popester said in What Are You Doing Right Now:
Trying to wrap my brain around adding a CA to our domain so we can encrypt traffic between servers. OMG... Where do I start....
For AD, I assume?
Yes sir. What brought it about was we run Citrix xenapp and nothing is encrypted this side of the ADC
Well, the passwords are. That's the only important bit in a typical domain communications chain. Not to belittle "encrypt everything", because that's a good idea in general. Just saying that AD is decently secure even when at its least secure.
AD (and everything using it) is only as secure as the DC.
-
@Obsolesce said in What Are You Doing Right Now:
@scottalanmiller said in What Are You Doing Right Now:
@popester said in What Are You Doing Right Now:
@scottalanmiller said in What Are You Doing Right Now:
@popester said in What Are You Doing Right Now:
Trying to wrap my brain around adding a CA to our domain so we can encrypt traffic between servers. OMG... Where do I start....
For AD, I assume?
Yes sir. What brought it about was we run Citrix xenapp and nothing is encrypted this side of the ADC
Well, the passwords are. That's the only important bit in a typical domain communications chain. Not to belittle "encrypt everything", because that's a good idea in general. Just saying that AD is decently secure even when at its least secure.
AD (and everything using it) is only as secure as the DC.
DCs are pretty secure unless you screw something up. However, the DC does not hold passwords, so even a compromised DC does not divulge passwords. So technically, it can be more secure than the DC
-
Leaving work because its now Margarita time!
-
@scottalanmiller said in What Are You Doing Right Now:
@Obsolesce said in What Are You Doing Right Now:
@scottalanmiller said in What Are You Doing Right Now:
@popester said in What Are You Doing Right Now:
@scottalanmiller said in What Are You Doing Right Now:
@popester said in What Are You Doing Right Now:
Trying to wrap my brain around adding a CA to our domain so we can encrypt traffic between servers. OMG... Where do I start....
For AD, I assume?
Yes sir. What brought it about was we run Citrix xenapp and nothing is encrypted this side of the ADC
Well, the passwords are. That's the only important bit in a typical domain communications chain. Not to belittle "encrypt everything", because that's a good idea in general. Just saying that AD is decently secure even when at its least secure.
AD (and everything using it) is only as secure as the DC.
DCs are pretty secure unless you screw something up. However, the DC does not hold passwords, so even a compromised DC does not divulge passwords. So technically, it can be more secure than the DC
That's the thing, if you compromise a DC, you don't need any passwords... There was a whole session on this that I have been to.
-
Counting down til I leave Sunday Evening for KC MO with a few friends.
Taking some time off work to go enjoy myself at a concert. -
@Obsolesce said in What Are You Doing Right Now:
@scottalanmiller said in What Are You Doing Right Now:
@Obsolesce said in What Are You Doing Right Now:
@scottalanmiller said in What Are You Doing Right Now:
@popester said in What Are You Doing Right Now:
@scottalanmiller said in What Are You Doing Right Now:
@popester said in What Are You Doing Right Now:
Trying to wrap my brain around adding a CA to our domain so we can encrypt traffic between servers. OMG... Where do I start....
For AD, I assume?
Yes sir. What brought it about was we run Citrix xenapp and nothing is encrypted this side of the ADC
Well, the passwords are. That's the only important bit in a typical domain communications chain. Not to belittle "encrypt everything", because that's a good idea in general. Just saying that AD is decently secure even when at its least secure.
AD (and everything using it) is only as secure as the DC.
DCs are pretty secure unless you screw something up. However, the DC does not hold passwords, so even a compromised DC does not divulge passwords. So technically, it can be more secure than the DC
That's the thing, if you compromise a DC, you don't need any passwords... There was a whole session on this that I have been to.
Depends on how you compromise it. What can someone do if they only have the data from the DC?
-
Well they can push things out from GPO, I guess.
-
@scottalanmiller said in What Are You Doing Right Now:
@Obsolesce said in What Are You Doing Right Now:
@scottalanmiller said in What Are You Doing Right Now:
@Obsolesce said in What Are You Doing Right Now:
@scottalanmiller said in What Are You Doing Right Now:
@popester said in What Are You Doing Right Now:
@scottalanmiller said in What Are You Doing Right Now:
@popester said in What Are You Doing Right Now:
Trying to wrap my brain around adding a CA to our domain so we can encrypt traffic between servers. OMG... Where do I start....
For AD, I assume?
Yes sir. What brought it about was we run Citrix xenapp and nothing is encrypted this side of the ADC
Well, the passwords are. That's the only important bit in a typical domain communications chain. Not to belittle "encrypt everything", because that's a good idea in general. Just saying that AD is decently secure even when at its least secure.
AD (and everything using it) is only as secure as the DC.
DCs are pretty secure unless you screw something up. However, the DC does not hold passwords, so even a compromised DC does not divulge passwords. So technically, it can be more secure than the DC
That's the thing, if you compromise a DC, you don't need any passwords... There was a whole session on this that I have been to.
Depends on how you compromise it. What can someone do if they only have the data from the DC?
They can access any data on any Domain PC.
-
One of the simplest things to do for a DC is enable BitLocker, especially if it's virtualized. Encrypting the data at rest on a virtual disk is essential.