Category: MSP360 Explorer
For several years, MSP360 Explorer has offered an integration with AWS CloudFront. After careful analysis, MSP360 has decided to discontinue this support. Going forward, customers will be able to work with Amazon CloudFront directly, rather than through MSP360 Explorer, to enjoy a more streamlined experience.
To learn more about using CloudFront in Amazon, refer to Amazon CloudFront Getting Started documentation.
We continue our series of articles devoted to common Amazon S3 issues. In our previous article, we discussed the difference between the requested time and the current time is too large error.
In this article we will discuss how to handle Your account is not signed up for the Amazon S3 issue. This error occurs when you are either not signed up for Amazon S3 or use expired credentials. There is a two-step process to get an Amazon S3 account. Continue reading
MSP360 Backup and MSP360 Explorer for Amazon S3 receive a minor update that brings support for BackBlaze B2 application keys.
This is the third article in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In Part II, we looked at writing identity-based policies to manage access to your S3 resources. In this Part III, we will cover authentication and identity within the context of AWS Identity and Access Management (IAM). Continue reading
This is the second in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In this Part II, we will take a deeper look at managing access to your S3 resources using AWS Identity and Access Management (IAM). Continue reading
To use Amazon S3 effectively, you need to be aware of the security mechanisms provided by AWS to control your S3 resources. This is the first part in a three-part series on S3 security. In this part, we will discuss the three different access control tools provided by AWS to manage your S3 resources. Continue reading
In this article, we'll learn how and why to use pre-signed S3 URLs to provide secure, temporary access to objects in your S3 buckets. We will discuss generating pre-signed S3 URLs for occasional, one-off use cases as well as programmatically generating them for use in your application code. There are multiple code examples for each use case.