Category Archives: Security

GitHub Repo: DNSCrypt-Proxy Installer

I use dnscrypt-proxy to proxy all my DNS queries through an encrypted tunnel to a DNS server. There is no reason my ISP should be able to see my DNS queries. I have been doing this for quite a while and created a dnscrypt-proxy v1 installer (now a dnscrypt-proxy v2 installer). Actually, I have a number of installers. Now it is time to update dnscrypt-proxy.

Continue reading GitHub Repo: DNSCrypt-Proxy Installer

Edward Haletky

Edward L. Haletky, aka Texiwill, is an author, analyst, developer, technologist, and business owner. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and TVP Strategy where he is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization.

ioSafe to the Rescue

Recently, I had to remove my remote Synology device from service—not because of failure, but due to the closing of the remote location. My off-site backup was no longer available. This provided food for thought. Why do we use an off-site backup? Could an on-site backup work in its place? The answer was an ioSafe.

Continue reading ioSafe to the Rescue

Edward Haletky

Edward L. Haletky, aka Texiwill, is an author, analyst, developer, technologist, and business owner. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and TVP Strategy where he is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization.

vSphere Upgrade Saga: vSphere Management Assistant Replacement

VMware will be removing the vSphere Management Assistant (vMA) from future versions of vSphere. I, for one, use vMA  quite a bit. However, all hope is not lost. It is pretty easy to build your own version of a vMA. It is even easier now, as I have created an installer.

Continue reading vSphere Upgrade Saga: vSphere Management Assistant Replacement

Edward Haletky

Edward L. Haletky, aka Texiwill, is an author, analyst, developer, technologist, and business owner. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and TVP Strategy where he is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization.

DISA STIG Auditing for the VMware vRealize Log Insight SOC

I previously created a VMware vRealize Log Insight security operations center (SOC), which has been updated to support vSphere 6.5 U1. This release, with the SecureESX teaser, has been released on GitHub already.  SecureESX has a bit of history behind it and has always been about auditing ESX and vSphere for security issues. Continue reading DISA STIG Auditing for the VMware vRealize Log Insight SOC

Edward Haletky

Edward L. Haletky, aka Texiwill, is an author, analyst, developer, technologist, and business owner. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and TVP Strategy where he is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization.

vSphere Upgrade Saga: NSX in 8 Easy Steps

Upgrading the virtual network to use NSX is not a heavy or large task. It can be, depending on what you are doing, but the basics are fairly straightforward. These basics are not the wholesale replacement of your existing virtual network. They are not the inclusion of new forms or routing in your virtual environment. The are the addition of NSX on top of what you already have. Once you have NSX in place, then you can dream, plan, and adopt those better ways of managing and creating virtual networks. Continue reading vSphere Upgrade Saga: NSX in 8 Easy Steps

Edward Haletky

Edward L. Haletky, aka Texiwill, is an author, analyst, developer, technologist, and business owner. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and TVP Strategy where he is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization.

Security Operations with VMware vRealize Log Insight

I have been creating a security operations center (SOC) specific to VMware vSphere using VMware vRealize Log Insight (vRLI). This SOC project shows the power of vRLI and the wealth of data available within vSphere 6.5. The original goal was to just gain visibility into my own environment. However, after showing the simple views to a few folks, it has grown from there and continues to grow.

Continue reading Security Operations with VMware vRealize Log Insight

Edward Haletky

Edward L. Haletky, aka Texiwill, is an author, analyst, developer, technologist, and business owner. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and TVP Strategy where he is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization.