As far as I know Kusto (or KQL) does not have geolocation to IP address functionality built in. I know that geolocation is often fraught and is never perfect however I have found that it can be another useful resource to leverage when looking through large amounts of data. About a year ago I created […]
Monitoring Tor Usage in Azure Sentinel, ASC, MDATP and ALA
Very quick and easy post today. Sometimes you want to monitor any Tor users coming into your environment. This post will show you how to…
HTTP to HTTPS Redirect on Azure CDN
There are some pretty good instructions by Microsoft on how to do a HTTP to HTTPS redirect with the Verizon CDN but what they don’t…
Strongswan IPSec (Including Cryptomap) to Microsoft Azure Virtual Network Gateway
We recently had to get a VPS Ubuntu server communicating through a Virtual Network Gateway (read IPSec concentrator) on Azure. We followed the documentation and…
Black Ops 3 NAT Type Strict & PS4 NAT Type 3 with pfSense Fixed!
It’s been a while since I’ve posted anything even remotely related to gaming, so I suppose this is a nice distraction! Since Sony gave us…
Sorry for the lack of posts
I know it has been a while since my last post, and I am sorry. My career has taken a slight turn (not a major…
How to Block Internet Access with Group Policy (GPO)
This how to will show you how to block internet access for a user, users or computer within an Active Directory Group Policy Object. I’ve…
Enforcing Microsoft Office 365 and Azure Tennancy with McAfee Web Gateway (MWG)
McAfee Web Gateway (MWG) is a pretty phenominal product, if you’re looking for a commercial web filtering solution then MWG should certainly be something you…
Scanning Subnet for Issuing Certificate Authority with OpenSSL
I was asked a question if there was an easy way to scan an entire subnet and display not the certificate of each device or…
How to Configure Windows 2012 NPS for Radius Authentication with Ubiquiti Unifi
In a corporate environment shared key encryption is rarely used due to the problems associated with distributing the appropriate keys. In the corporate wireless world…