Add Trello to Microsoft Teams.

First, you need to allow external apps in Microsoft Teams, We do it by clicking to this link

Select Microsoft Teams

Please wait 10 min to changes to take effect.

Reassign to Teams and go to “Get Apps” and search for the Trello App.

Forcepoint DLP Endpoint agents not registering with the Managment Server.

Open the URL in your management server.


You should see two folders in here


If you only have one then this is what is most likely causing the lack of endpoint updates. To resolve this if you Stop and disable the Data Security Batch Server service from services.msc and then go to the folder

C:\Program Files (x86)\Websense\Data Security\Data-Batch-Server\service-container\container\work

and move all of the folders in here to a new folder.

Now re-start the data batch service back up again. Then you need to give it a few minutes and then re-check the URL


and check now if you have the META-INF and WEB-INF in here.

If so then check now to see if you see endpoints now showing as updated

Forcepoint Web Proxy Pacfile.

function FindProxyForURL(url, host) {

host = host.toLowerCase();
url = url.toLowerCase();

// If the hostname matches, send direct.
if (dnsDomainIs(host, “”) || host == “”) ||
(dnsDomainIs(host, “”) || host == “”) ||
(dnsDomainIs(host, “”) || host == “”) ||
(dnsDomainIs(host, “”) || host == “”) ||
(dnsDomainIs(host, “”) || host == “”))

return “DIRECT”;

// If the hostname matches, send direct.
if ( shExpMatch(url, “greenhulk:8080/“) ) { return “DIRECT”; } if ( shExpMatch(url, “greenhulk:8082/“) ) { return “DIRECT”; }
if ( shExpMatch(url, “greenhulk:8081/“) ) { return “DIRECT”; } if ( shExpMatch(url, “greenhulk:8083/“) ) { return “DIRECT”; }

var allowedUrls = new Array(


for (index in allowedUrls)
if (shExpMatch(url, allowedUrls[index]))
return “DIRECT”;

// If its internal lan, send direct

if (isPlainHostName(host))
return “DIRECT”;

return “PROXY; DIRECT”;


When you suspect Your Checkpoint Firewall is blocking your connection.

Congratulations after all the tests of Pings and Telnets and tracert from different IP addresses and eliminating agents on the endpoint test machine. You have decided that the problem of communication probably comes from the firewall.

In this tutorial, I will show you the basics of how to start checking if the firewall is blocking or interrupt your communication.

  1. First, check the logs to see if packets getting dropped!

2. To really rule out a problem with the firewall rules I suggest creating permit any rule just for testing.

permit any rule

3. Make sure That NAT is configured for the specific VLAN.

4. Every Packet that goes out must go back in, so please check that you have a static route.

5. IPS log, it’s a must!

6. This command gives you more reasones why the packet got dropped from the GUI Version in line 1. connect using SSH to the Firewall GW machine and run this command “fw ctl zdebug + drop | grep X.X.X.X”

7. Check Interface Details for MTU Mismatch or duplex issue or also for CRC errors on the network card

8. Make the Standby Active, I hope your firewall is apart of a cluster if so try to work with the second FW.

  • Command “cphastop” to stop a cluster member from passing traffic. Stops synchronization. (emergency only)

SNMP V2 on Cisco Catalyst Switch.

Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior. Devices that typically support SNMP include cable modems, routers, switches, servers, workstations, printers, and more.

How do I configure SNMP V2 on Cisco Catalyst 2960x including ACL (Access list):

ACL – we creating an access list that only permits to specific IP to collect SNMP data. 

  • 192.168.10.X allowed to only use snmp to read data from the devices. RO (Read only Mode)
  • 192.168.9.X allowed can also read the data from the devices and also write to the devices. RW ( Read and Write)

access-list 5 permit 192.168.10.X
access-list 5 permit 192.168.9.X
access-list 5 deny any

snmp-server community “Password1” RO 5
snmp-server community “Password2” RW 5
snmp-server enable traps snmp linkdown linkup
snmp-server host 192.168.10.X version 2c “Password1”
snmp-server host 192.168.9.X version 2c “Password2”


Monitor system collect data like Temp, Cpu, Memory using SNMP protocol from devices and present us the information in a readable and easy way.


%d bloggers like this: