Posts

Getting Started With Amazon EC2

Image
  Overview The following diagram shows the key components: • An image-  A template that contains the software to run on your instance, such as the operating system. • A key pair-  A set of security credentials that you use to prove your identity when connecting to your instance. The public key is on your instance and the private key is on your computer. • A network-  A virtual private cloud (VPC) is a virtual network dedicated to your AWS account. To help you get started quickly, your account comes with a default VPC in each AWS Region, and each default VPC has a default subnet in each Availability Zone. • A security group-  Acts as a virtual firewall to control inbound and outbound traffic. • An EBS volume-  We require a root volume for the image. You can optionally add data volumes. Step 1: Launch an Instance 1. Open the Amazon EC2 console at https://console.aws.amazon.com/ec2/. 2. In the navigation bar at the top of the screen, we display t...

Amazon Elastic Compute Cloud (Part 2)

Image
  Access Amazon EC2 You can create and manage your Amazon EC2 instances using the following interfaces: Amazon EC2 Console- An easy-to-use web interface for creating and handling Amazon EC2 instances and resources. After registering for an AWS account, you can enter the Amazon EC2 console by logging into the AWS Management Console and choosing EC2 from the homepage. AWS Command Line Interface- A llows you to engage with AWS services through commands in your command-line interface. It is compatible with Windows, Mac, and Linux operating systems. AWS Cloud Formation- Amazon EC2 allows for the creation of resources through AWS CloudFormation. You design a template in either JSON or YAML format that outlines your AWS resources, and AWS CloudFormation handles the provisioning and configuration of those resources on your behalf. You have the ability to reuse your CloudFormation templates to deploy the same resources numerous times, whether within the same Region and account or across d...

Amazon Elastic Compute Cloud (Part 1)

Image
  What is Amazon EC2?  Amazon Elastic Compute Cloud (Amazon EC2) offers scalable computing power on demand within the Amazon Web Services (AWS) Cloud. Utilizing Amazon EC2 helps lower hardware expenses, enabling quicker development and deployment of applications. You can launch any number of virtual servers based on your needs, set up security and networking, and oversee storage. It's possible to increase capacity (scale up) to manage computationally intensive tasks, such as monthly or annual operations, or during traffic surges on your website. When demand decreases, you can also decrease capacity (scale down) as needed.  An EC2 instance functions as a virtual server within the AWS Cloud. When you initiate an EC2 instance, the instance type you choose dictates the hardware configuration available for your instance. Each instance type provides a distinct combination of computing power, memory, networking, and storage capabilities. Features of Amazon EC2 Amazon EC2 provide...

Sensitivity Labels Are Missing In Outlook, Outlook On The Web, & Other Office Apps

Image
  Symptoms To categorize and safeguard user documents and emails within your company, you have set up sensitivity labels in the Microsoft Purview platform. The sensitivity labels are absent or the Sensitivity button is unavailable when your users attempt to apply them in Outlook, Outlook on the web, or other Office applications.  For issues related to sensitivity labels, run an automated diagnostic for sensitivity labels in the Microsoft 365 admin center. It analyzes the sensitivity labels, identifies any issues, and provides resolutions.  Run the Diagnostic For Sensitivity Labels Choose the Run Tests: Sensitivity Labels button to open the diagnostic in the Microsoft 365 admin center. Enter Label name and User Principal Name (UPN) or email address of the user.  Select Run Tests. Outlook This issue occurs for one of the following reasons: The user account that's signed in to Outlook isn't a Microsoft 365 subscriber. The security labels aren't published in the Microsof...

Sensitivity Labels: Mail Contacts In Groups Have Intermittent Access To Encrypted Content

Image
Symptoms External users who are mail contacts in a Microsoft 365 group report that they have no access, or only intermittent access, to encrypted content.  Cause This known issue affects mail contacts in groups that have usage rights to content that's encrypted by Microsoft Purview Information Protection.  Note- Encryption is commonly applied by using sensitivity labels that are created and published from the Microsoft Purview portal.  Workaround Use the following steps to workaround the issue: Identify all group members that are mail contacts. For each external user that's identified as a mail contact in the affected group, select one of the following options-  Convert to a guest- Add the external user to the group as a guest. Grant direct permissions- Directly grant the external user permissions on the encrypted content rather than through group membership.         3. Remove the mail contacts from the group.  Conclusion The issue regarding ...

Sensitivity Labels: "Too many users" error when adding many recipients to encrypted email

Image
  Symptoms You apply one of the following options to an email message by using a sensitivity label or email encryption in Outlook: Do Not Forward Encrypt-Only  When you try to send this encrypted email message to many recipients, you receive the following error message: Too many users have been granted access to this protected content. Reduce the number of users or replace users with user groups, and try again.  Note: The number of recipients that causes this error varies, depending on both the number of recipients and the length of each recipient's email address. For typical email addresses, this error usually occurs if hundreds of email addresses are added to the message. Only the number of email addresses that are individually added to the recipient list causes this error. Cause This problem arises from the size restriction of the protection policy applied to the email. In Microsoft Purview Information Protection, this rigid size cap is set at 4 MB. The protection poli...

PST Import Service: Import Job Common Issues

Image
  Issues That Affect PST Import Jobs When utilizing the Import service in the Security & Compliance Center to bring PST files into user mailboxes within your organization, the final step in your process is to initiate the import job you have created. During the execution of the import process, you may encounter problems, including sluggish performance or the failure of the job.  Import Job is Stuck Or Running Slowly The Microsoft 365 Import service typically ingests PST files into mailboxes at a rate of around 24 GB daily. While this rate is common, it cannot be assured since the Import service operates within a shared environment that accommodates multiple tenants.  Note- You should use the Import Service UI in Microsoft 365 to create new Import jobs. Using PowerShell for this task isn't supported.  If your import process is slow or seems to be halted, the PST file may exceed the recommended maximum size of 20 GB. For the ongoing job, anticipate delays if the si...