Pages

Monday, 7 November 2022

Indian Law won't cover you being photographed secretly but there is still some hope, IPC Law and Order

Ref. to IPC (The Indian Penal Code), 

  1. https://www.indiacode.nic.in/  
  2. https://indiankanoon.org/

News Articles: 

https://www.edexlive.com/news/2018/jan/08/indian-law-wont-cover-you-being-photographed-secretly-but-there-is-still-some-hope-1864.html#:~:text=*The%20law%20makes%20it%20clear,person%20in%20the%20photograph%20is

Ref. to Article  19, 21 *The law makes it clear you are free to take pictures for private use of other people in public areas under the Constitution of India Article 19, however publishing a photo in a manner that might be "embarrassing, mentally traumatic" or causing "a sense of insecurity about the activities the person in the photograph is involved in" is illegal under Article 21.

Section 509 in IPChttps://indiankanoon.org/doc/68146/ 

Section 354- A,B,C and D

Defamation Case: It is an act of imputing any person with intent to tarnish the dignity of the person by hacking their mail account and sending e-mails using vulgar language to unknown persons

Article 19 in The Constitution Of India 1949

19. Protection of certain rights regarding freedom of speech etc
(1) All citizens shall have the right
(a) to freedom of speech and expression;
(b) to assemble peaceably and without arms;
(c) to form associations or unions;
(d) to move freely throughout the territory of India;
(e) to reside and settle in any part of the territory of India; and
(f) omitted
(g) to practise any profession, or to carry on any occupation, trade or business

Friday, 16 September 2022

Newsletter of Zenith Gavels Club - Dazzle 2022


NEWSLETTER OF ZENITH GAVELS CLUB | DAZZLE 2022 | VOL 1 ISSUE 1



Prepared, Edited and Published by Venus Rinith  - Newsletter Editor and VPPR 2021-2022


Newsletter by Venus Rinith










QR Code to read this news letter

Thursday, 19 May 2022

Cannot open ECP via On-Prem Exchange


Situation:

We had migrated all our employees to exchange online and decommissioned our on-prem exchange servers which was hosting user databases. Retained on-prem exchange server 2013 CU22 just for SMTP application relay purpose. Also have created a new on-prem database with 2 user mailbox. However, with that user we were not able to login to the ECP on-prem. 

No issues in login to the online Exchange Admin Centre. 

What errors do you see? 

:-( Something went wrong We can't get that information right now. Please try again later 


What's the environment and are there recent changes? 

Exchange server 2013 Cu22 on Windows 2012R2. 

Our emails (...domain) have been migrated to exchange online. 

We are using exchange on-prem for the application servers hosted on Azure to relay to onprem-exchange. Noticed that on-prem ECP wasn't accessible. Single database and two mailbox accounts on on-prem exchange

What have you tried to troubleshoot this? 

Verified on-prem database and 2 users accounts already available on on-prem exchange. but cannot login via https://localhost/ecp

Resolution:

You cannot access ECP, it is getting redirected to office 365 while accessing local host/ecp.

We checked the HTTP redirect on Default Frontend, there are no settings found.

We checked the HTTP redirect on ECP, we found no settings

We found HTTP redirect configured for OWA, redirected to office 365 portal

We unchecked the settings and were able to access ECP successfully.

Password Policies and Recommendations


As per Microsoft baseline recommendation, good practice to fine tune password lockout threshold from 15 invalid logon attempts to 10 invalid logon attempts

 





Minimum is password length is 8 characters as per Microsoft guidelines (Password policy recommendations - Microsoft 365 admin | Microsoft Docs)

Windows security baseline recommend configuring a threshold of 10 invalid sign-in attempts

Account lockout threshold (Windows 10) - Windows security | Microsoft Docs

 

Check Group Policies applied to a User Account and Computer

 

Resultant Set of Policy

There is a built-in tool called “Resultant Set of Policy” (RSoP) that simulates the policy settings applied to computers and users using Group Policy. It acts as a query engine that polls existing policies based on site, domain, domain controller, and organizational unit, and then reports the results of those queries.

To launch Resultant Set of Policy, press Win + R to fire up the Run dialog box, type rsop.msc, and press Enter.











The tool fires up and scans the active policies and displays them within the tool. You will still need to go through the folders to find out each active policy applied to the account and computer.














GPResult

Alternatively, there is also a command line called GPResult that you can also use to collect active Group Policy settings. Simply open a Command Prompt and run the following command.

gpresult /scope user /v

This is to search and show all the active policies applied to the current user. To find all policies applied to the PC, run the following instead in an elevated Command Prompt window.

gpresult /scope computer /v

Even more, you can use GPResult to gather Group Policy information applied to certain user account from a remote computer, such as below:

gpresult /c computername /u username /p password /user targetusername /scope user /r

Or, all Group Policies applied to a remote computer:

gpresult /c computername /u username /p password /scope computer /r

Note that the switch /r is to display RSoP summary data while /v is to display verbose policy information.