Testing M365 Security Yourself

Optimieren Sie Ihre Microsoft 365 Cloud-Dienste mit ScubaGear

Microsoft 365 (M365) ist eine beliebte clouds-basierte Office-Suite, die von Unternehmen und Behörden weltweit genutzt wird. However, the security of your M365 tenant is a top priority, especially in today’s cybersecurity landscape. That’s why the United States Computer Emergency Readiness Team (US-CERT) has developed ScubaGear, a free tool that allows you to scan and optimize your M365 cloud services for security vulnerabilities. In this blog post, we’ll explore ScubaGear and how it can help you improve the security of your M365 tenant.

What is ScubaGear?

ScubaGear is a free tool developed by US-CERT that allows you to scan and optimize your M365 cloud services for security vulnerabilities. The tool covers a wide range of configurations, policy violations, and other security issues, providing practical recommendations on how to address them. ScubaGear can be used by anyone, and it’s especially useful for organizations that are looking to improve the security of their M365 tenant.

How does ScubaGear work?

ScubaGear works by scanning your M365 cloud services for security vulnerabilities and providing recommendations on how to address them. The tool is designed to be easy to use, even for those who are not familiar with security testing. Here’s a high-level overview of how ScubaGear works:

1. Download and install ScubaGear on your system.

2. Launch ScubaGear and select the type of scan you want to perform (e.g., a full scan or a quick scan).

3. ScubaGear will then scan your M365 cloud services for security vulnerabilities and provide recommendations on how to address them.

4. Review the results of the scan and implement the recommended security measures to improve the security of your M365 tenant.

What are the benefits of using ScubaGear?

There are several benefits to using ScubaGear, including:

1. Improved security: ScubaGear can help you identify and address security vulnerabilities in your M365 cloud services, reducing the risk of cyber attacks and data breaches.

2. Compliance: ScubaGear can help you ensure that your M365 tenant is compliant with relevant regulations and standards, such as GDPR and HIPAA.

3. Cost savings: By identifying and addressing security vulnerabilities, you can avoid the costs associated with cleaning up after a cyber attack or data breach.

4. Increased peace of mind: ScubaGear can provide you with increased peace of mind, knowing that your M365 tenant is secure and compliant.

How to use ScubaGear for your M365 cloud services

To use ScubaGear for your M365 cloud services, follow these steps:

1. Download and install ScubaGear on your system.

2. Launch ScubaGear and select the type of scan you want to perform (e.g., a full scan or a quick scan).

3. ScubaGear will then scan your M365 cloud services for security vulnerabilities and provide recommendations on how to address them.

4. Review the results of the scan and implement the recommended security measures to improve the security of your M365 tenant.

Upcoming webinar on ScubaGear

If you’re interested in learning more about ScubaGear and how it can help you improve the security of your M365 tenant, consider registering for our upcoming webinar. During the webinar, we’ll provide a comprehensive overview of ScubaGear, including its features, capabilities, and benefits. We’ll also demonstrate how to use ScubaGear to scan and optimize your M365 cloud services for security vulnerabilities.

Conclusion

ScubaGear is a valuable tool that can help you improve the security of your M365 tenant. With its ability to scan and optimize your cloud services for security vulnerabilities, ScubaGear can provide you with increased peace of mind and help you avoid the costs associated with cleaning up after a cyber attack or data breach. If you’re interested in learning more about ScubaGear, consider registering for our upcoming webinar.

Effortless Windows Server VM Deployment with Microsoft Deployment Toolkit 2013

Deploying Windows Server VMs with Microsoft Deployment Toolkit 2013 – Part I

In this series of articles, we will explore how to deploy Windows Server virtual machines (VMs) using Microsoft Deployment Toolkit 2013 (MDT 2013). In this first article, we will cover the basic installation and configuration of MDT 2013, Windows Deployment Services (WDS), and Assessment and Deployment Kit (ADK) for Windows 8.1.

What is MDT 2013?

MDT 2013 is a powerful tool that allows you to automate the deployment of Windows OS and applications to clients and servers. It supports deployment of Windows 7, Windows 8, Windows 8.1, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. MDT 2013 uses image files that contain everything you need to install a Windows OS on a target computer, including unattended setup files and drivers.

MDT 2013 creates custom Windows Preinstallation Environment (Windows PE) images that are used to install the image onto the target computer. The Windows PE image can be booted using USB, CD/DVD, or WDS. You can run MDT 2013 standalone or with System Center Configuration Manager (SCCM).

Why Use MDT 2013?

There are several reasons why you might choose to use MDT 2013 for deploying Windows Server VMs:

1. Flexibility: MDT 2013 supports deployment of a wide range of Windows OS versions, allowing you to deploy the correct version of the OS for your specific needs.

2. Automation: MDT 2013 allows you to automate the deployment process, making it easier and faster to deploy Windows Server VMs.

3. Customization: MDT 2013 allows you to customize the deployment process to fit your specific needs, including adding drivers and applications.

4. Integration: MDT 2013 can be integrated with other Microsoft tools, such as SCCM, to provide a comprehensive deployment solution.

Getting Started with MDT 2013

To get started with MDT 2013, you will need to have the following components installed:

1. WDS: This is used to deploy the Windows OS image to the target computer.

2. MDT 2013: This is the tool that allows you to automate the deployment process.

3. ADK for Windows 8.1: This is used to create the Windows PE image that is deployed to the target computer.

Installing WDS and MDT 2013

To install WDS and MDT 2013, follow these steps:

1. Download the WDS and MDT 2013 installation media from the Microsoft website.

2. Insert the USB drive or DVD into your computer.

3. Boot your computer using the USB drive or DVD.

4. Select your language and other options as prompted, and then click “Next” to continue.

5. Select “Install WDS” and “Install MDT 2013” to install these components.

6. Follow the prompts to complete the installation.

Installing ADK for Windows 8.1

To install ADK for Windows 8.1, follow these steps:

1. Download the ADK for Windows 8.1 installation media from the Microsoft website.

2. Insert the USB drive or DVD into your computer.

3. Boot your computer using the USB drive or DVD.

4. Select your language and other options as prompted, and then click “Next” to continue.

5. Select “Install ADK for Windows 8.1” to install this component.

6. Follow the prompts to complete the installation.

In the next article of this series, we will cover how to configure MDT 2013, import the necessary drivers and OS images, and deploy a Windows 2008 R2 server with VMware Tools. Stay tuned!

Navigating the Skies with Co-pilot for MS 365 in China

As a Microsoft enthusiast, I am often asked about the compatibility of various Microsoft products and services with different regions and platforms. Recently, a user asked me if they could use Co-pilot for MS 365 in China or if it is compatible with remote desktop. In this blog post, I will provide an answer to these questions and offer some additional information on the topic.

Co-pilot for MS 365 is a feature that allows users to access their Microsoft accounts and services from multiple devices, including desktops, laptops, and mobile devices. It is designed to provide seamless access to Microsoft’s suite of productivity apps, including Word, Excel, PowerPoint, and OneNote, as well as other services such as Outlook and OneDrive.

When it comes to using Co-pilot for MS 365 in China, there are a few things to consider. Firstly, Microsoft does not provide official support for Co-pilot in China, which means that users may not have access to the same level of customer support or updates as they would in other regions. Additionally, some features of Co-pilot may not be available in China due to government regulations or restrictions on cloud-based services.

That being said, it is possible to use Co-pilot for MS 365 in China, but users should be aware of the potential limitations and risks involved. To access Co-pilot in China, users will need to have a valid Microsoft account and a reliable internet connection. They can then download the Co-pilot app from the Microsoft Store or other authorized app stores, and log in with their Microsoft account credentials.

As for using Co-pilot in remote desktop environments, it is possible but may require some additional setup and configuration. Remote desktop services allow users to access their desktops and applications from a remote location, such as a different physical location or a virtual machine. To use Co-pilot with remote desktop, users will need to ensure that their remote desktop environment is configured to allow for the necessary network traffic and that their Microsoft account is properly configured to allow for single sign-on access to their apps and services.

In summary, while Co-pilot for MS 365 may not be officially supported in China, it is possible to use it in the region with some limitations and risks. Additionally, using Co-pilot in remote desktop environments is possible but may require additional setup and configuration. As with any Microsoft product or service, users should carefully review the terms of service and any applicable usage guidelines before using Co-pilot for MS 365 in China or remote desktop environments.

Unlocking Mobile Productivity with VMware Workspace ONE Intelligent Hub

VMware Workspace ONE Intelligent Hub: Streamlining Mobile Notifications for Better Productivity

In today’s fast-paced digital workplace, employees are constantly bombarded with notifications from various business apps and tools. These notifications can be distracting and disruptive, taking away from the productivity of your workforce. However, with VMware Workspace ONE Intelligent Hub, you can streamline these notifications and improve overall productivity.

Mobile Flows: The Key to Simplifying Notification Workflows

VMware Workspace ONE Intelligent Hub offers a feature called Mobile Flows, which enables the processing of notification workflows from other business apps such as ServiceNow. This feature allows you to deliver notifications directly to the Workspace ONE Hub, simplifying the notification process and reducing distractions for your employees.

Setting Up Mobile Flows with Out-of-the-Box Connectors

Setting up Mobile Flows with Out-of-the-Box connectors is easy and straightforward. With pre-built connectors for popular business apps such as ServiceNow, you can quickly and easily integrate these apps with Workspace ONE Hub. This eliminates the need for custom coding and reduces the complexity of the setup process.

The Benefits of Mobile Flows in Workspace ONE Intelligent Hub

The benefits of using Mobile Flows in Workspace ONE Intelligent Hub are numerous. Here are just a few:

1. Simplified Notification Process: With Mobile Flows, you can simplify the notification process by delivering notifications directly to the Workspace ONE Hub. This reduces distractions and improves productivity for your employees.

2. Improved Productivity: By streamlining the notification process, you can improve productivity and reduce the time spent on managing notifications. This allows your employees to focus on more important tasks and projects.

3. Better Collaboration: Mobile Flows enable better collaboration between business apps and Workspace ONE Hub. This leads to a more integrated and seamless workflow, making it easier for your employees to work together and share information.

4. Enhanced Security: With Mobile Flows, you can enhance the security of your notification process. By delivering notifications directly to the Workspace ONE Hub, you can reduce the risk of data breaches and other security threats.

Conclusion

VMware Workspace ONE Intelligent Hub’s Mobile Flows feature is a powerful tool for simplifying notification workflows and improving productivity. By using pre-built connectors for popular business apps, you can quickly and easily set up Mobile Flows and start streamlining your notification process today. With its numerous benefits, Mobile Flows are an essential feature for any digital workplace looking to improve collaboration, security, and overall productivity.

Evernote Clipper

Using Evernote’s Clipper Functionality to Enhance Your Productivity

As an avid user of Evernote, I have found that one of the most useful features of the Windows desktop application is the Clipper functionality. This feature allows me to easily capture and save screenshots, code snippets, and other content from my computer screen to my Evernote notes. In this blog post, I will explore how to use the Clipper functionality in Evernote to enhance your productivity.

What is Clipper?

The Clipper feature in Evernote allows you to capture a selection of your screen and save it as an image or text directly into your Evernote notes. This feature can be accessed by pressing the Windows key and the Print Screen button (PrtScn) at the same time. When you do this, a cross-hair will appear on your screen, allowing you to select an area of your screen that you want to capture.

How to Use Clipper

To use the Clipper feature in Evernote, follow these steps:

1. Open Evernote on your Windows desktop.

2. Press the Windows key and the Print Screen button (PrtScn) at the same time to open the Clipper functionality.

3. Use the cross-hair to select the area of your screen that you want to capture. You can adjust the size of the selection by clicking and dragging the cross-hair.

4. Once you have selected the desired area, press Enter or click on the “Capture” button to save the selection to your Evernote notes.

By default, the selection will be saved as a note in Evernote. However, if you press the Ctrl key while selecting the area, the content will be placed in the Windows clipboard instead, ready for pasting into other applications. This can be useful if you want to paste the content into another program or document without having to open Evernote first.

If you press the Shift key while selecting the area, the selection will be saved as a PNG image file on your desktop. This can be helpful if you want to save the content as an image rather than text.

Tips for Using Clipper

Here are some tips for using the Clipper feature in Evernote:

1. Use the Clipper feature to capture code snippets or other content that you want to reference later. This can be especially useful if you are working on a programming project or writing an article.

2. Use the Clipper feature to save screenshots of web pages or other online content that you want to keep for future reference.

3. Use the Clipper feature to capture ideas or inspiration as they come to you. This can help you keep track of your thoughts and ensure that you don’t forget any important ideas.

4. Experiment with different methods of capturing content using the Clipper feature. For example, you might find it helpful to capture a selection of text using the Ctrl key, or to save an image as a PNG file using the Shift key.

Conclusion

The Clipper feature in Evernote is a powerful tool that can help you enhance your productivity and keep track of important information. By using the Clipper feature to capture screenshots, code snippets, and other content, you can ensure that you never lose an idea or inspiration again. With this feature, you can easily save and organize content from your computer screen directly into your Evernote notes.

Driven by Testing

The Future of Prompt Engineering: Automated Testing and Beyond

In the rapidly evolving world of artificial intelligence, prompt engineering has become an essential tool for developers and researchers alike. As language models continue to advance and improve, the need for efficient and reliable testing methods has grown increasingly important. In this article, we will explore the current state of automated testing in prompt engineering, its potential applications, and the future of this technology.

The Importance of Automated Testing in Prompt Engineering

Automated testing is a crucial aspect of software development that involves testing software with pre-scripted tests to ensure its functionality and reliability. In the context of prompt engineering, automated testing can help validate the behavior of language models and evaluate their performance on various tasks. This is particularly important in the field of generative AI, where the accuracy and consistency of model outputs are critical for real-world applications.

Automated testing can be applied to various areas of prompt engineering, including but not limited to:

1. Evaluating the quality of generated text: Automated tests can assess the coherence, readability, and relevance of text generated by language models.

2. Validating the accuracy of model responses: By comparing the predicted outputs with ground truth data, automated tests can verify the accuracy of language models on specific tasks.

3. Testing the robustness of models to variations in input: Automated testing can help identify potential issues with model performance under different input conditions, such as variations in tone, style, or context.

The Workflow of Automated Testing in Prompt Engineering

The workflow of automated testing in prompt engineering typically involves the following steps:

1. Preprocessing: The input data is preprocessed to prepare it for testing. This may involve tokenization, stemming, or other normalization techniques.

2. Test Generation: Automated tests are generated using a variety of techniques, such as random sampling or template-based generation.

3. Test Execution: The generated tests are executed on the language model, and the output is evaluated for accuracy and relevance.

4. Results Analysis: The results of the tests are analyzed to identify any issues or areas for improvement in the language model.

Challenges and Limitations of Automated Testing in Prompt Engineering

While automated testing is a powerful tool for evaluating language models, it is not without its challenges and limitations. Some of these include:

1. Lack of domain knowledge: Automated tests may not fully capture the nuances and complexities of human language, leading to inadequate or misleading results.

2. Limited flexibility: Automated testing may not be able to accommodate changes in input data or model architecture, which can limit its applicability.

3. Difficulty in evaluating certain tasks: Some tasks, such as common sense reasoning or creative output, are challenging to evaluate using automated tests due to their subjective nature.

Future Directions for Automated Testing in Prompt Engineering

Despite the challenges and limitations, the future of automated testing in prompt engineering looks promising. Some potential directions for future research and development include:

1. Improving the accuracy and relevance of generated tests: Researchers can explore new techniques for generating more accurate and relevant tests, such as using reinforcement learning or transfer learning.

2. Developing more flexible testing frameworks: Future testing frameworks could be designed to accommodate changes in input data, model architecture, or other parameters.

3. Integrating human evaluation: To address the limitations of automated testing, researchers can explore ways to integrate human evaluation into the testing process, such as using human evaluators to assess the relevance and coherence of generated text.

Conclusion

Automated testing is a crucial aspect of prompt engineering that can help evaluate the performance of language models and ensure their reliability in real-world applications. While there are challenges and limitations to this technology, ongoing research and development have the potential to overcome these obstacles and push the boundaries of what is possible with automated testing in prompt engineering. As the field continues to evolve, we can expect to see more sophisticated and effective testing methods emerge, leading to better language models and more advanced AI applications.

Unlocking Performance with VMFS-5

VMware vSphere 5: The Future of Virtualization Storage

The upcoming release of VMware vSphere 5 brings with it a plethora of exciting new features and improvements, but one that stands out in particular is the upgraded version of the VMware vStorage VMFS volume file system. With VMFS-5, VMware has addressed one of the limitations of its predecessor, VMFS-3, which restricted the maximum size of VMDK files based on the block size defined during datastore formatting.

The issue with VMFS-3 was that the block size determined the maximum size of VMDK files stored on the datastore. This meant that when planning your datastore infrastructure, you had to have a clear idea of how large your VMDK files might potentially be during the lifecycle of the datastore. For VMFS-2 and VMFS-3, the block sizes and their impact on VMDK files looked like this:

[table id=2 /]

As you can see, if you formatted your datastore with a 1MB block size, the maximum VMDK file size would be limited to 256GB. While this may not be a significant issue for small to medium-sized environments, it could prove to be a real headache for larger ones with limited storage space.

Thankfully, VMware has eliminated this limitation in VMware vSphere 5 and VMFS-5. The new unified block size is now 1MB, and the limits on VMDK file sizes are completely removed. In fact, the block size no longer really matters, as there are no longer any limits to worry about.

Here’s a simplified table for vSphere 5 and VMFS-5:

[table id=3 /]

Upgrading from VMFS-3 to VMFS-5 is an online and non-disruptive upgrade operation, which means you can perform the upgrade while your VMs are running on the datastore. Additionally, you can extend VMDK files to the new limits on an upgraded VMFS-3 datastore, as long as it has been upgraded to VMFS-5.

Note that in order to take advantage of these new features and improvements, you’ll need to update all your hosts to vSphere 5 before upgrading your datastores. This is because vSphere 4 (and earlier) can’t read the new VMFS-5 filesystem.

This simplification of VMDK file sizes is a welcome change for vAdmins, as we no longer have to worry about block size limitations when planning our virtualization storage infrastructure. Of course, there are other improvements in VMFS-5 as well, but we’ll save those for future posts.

In conclusion, the upgraded version of the VMware vStorage VMFS volume file system in VMware vSphere 5 is a significant improvement over its predecessor, VMFS-3. With the elimination of VMDK file size limitations and the simplified table for block sizes, vAdmins can now focus on other aspects of their virtualization storage infrastructure. We’re excited to see how this new feature will impact your virtualization environments!

Unlocking Performance with VMFS-5

VMware vSphere 5: Say Goodbye to Limited VMDK File Sizes with VMFS-5

In the world of virtualization, VMware vSphere 5 is the latest and greatest iteration of the vSphere suite, offering a plethora of new features and improvements over its predecessors. One such improvement is the upgraded version of the VMware vStorage VMFS volume file system, known as VMFS-5. With this new version, one of the limitations of VMFS-3 has been addressed, allowing for larger VMDK files and more flexibility in planning your datastore infrastructure.

The Problem with VMFS-3

With VMFS-3, the block size you define when formatting the datastore determines the maximum size of the VMDK files stored on it. This means that if you format your datastore with a 1MB block size, you are limited to a maximum VMDK file size of 256GB. While this may not be a problem for smaller environments, it can become a real issue for those with limited storage space.

The Solution: VMFS-5

VMware has addressed this limitation in VMFS-5 by introducing a new unified block size of 1MB, which no longer limits the maximum VMDK file size. In fact, the block size no longer really matters, as the limits are removed completely. This means that you can store larger VMDK files without having to worry about the block size, giving you more flexibility in your datastore infrastructure planning.

Upgrading to VMFS-5

Upgrading from VMFS-3 to VMFS-5 is an online and non-disruptive upgrade operation, which means that you can do it while your VMs are running on the datastore. Additionally, if you have already formatted your datastore with a smaller block size, you can still upgrade to VMFS-5 and extend your VMDK files to the new limits.

Host Upgrade Required

Before upgrading your datastores to VMFS-5, it’s important to update all your hosts to vSphere 5, as vSphere 4 (and earlier) cannot read the new VMFS-5 filesystem. This is a crucial step, as it ensures that your hosts can properly communicate with the upgraded datastores.

Conclusion

The upgraded version of the VMware vStorage VMFS volume file system in VMware vSphere 5, known as VMFS-5, offers a significant improvement over VMFS-3 by removing the limitations on VMDK file sizes. This means that you can store larger VMDK files without having to worry about the block size, giving you more flexibility in your datastore infrastructure planning. With this new version, vAdmins no longer have to worry about the block size as a limiting factor for their VMs. Simplification is always welcome!

Deploying Windows Server VMs with Microsoft Deployment Toolkit 2013

Configuring MDT 2013 for Windows 2008 R2 Deployment

=====================================================

In this article, we will guide you through the process of configuring Microsoft Deployment Toolkit (MDT) 2013 for deploying Windows 2008 R2. We will cover the steps to create a deployment share, import OS images, and drivers, and prepare the environment for deployment.

Creating a Deployment Share

—————————–

The first step is to create a deployment share, which is a file share used to access software, drivers, and other deployment files during the deployment phase. To create a deployment share, follow these steps:

1. Open the Deployment Workbench, which can be found in the Start menu.

2. Right-click on the “Deployment Shares” item in the left menu, and select “New Deployment Share”.

3. The “New Deployment Share Wizard” will appear. Follow the wizard to create a new deployment share.

4. Since I have a dedicated volume for the deployment stuff, I set the path to drive D:.

5. The share ends with a $-sign, which is the default setting and makes the share a hidden share. If you don’t want to use a hidden share, delete the $-sign at the end of the share name.

6. Enter an appropriate description for the deployment share.

Importing OS Images

———————-

Next, we need to import the OS images for Windows 2008 R2. To do this, follow these steps:

1. Right-click on the “Operating Systems” item in the left menu, and select “Import Operating System”.

2. The “Import Operating System Wizard” will appear. Select the first item from the list and point to the directory with the extracted Windows 2008 R2 ISO.

3. Specify an appropriate name for the directory entry.

4. Clicking on “Next” will lead you to the summary screen. Again, clicking on “Next” starts the import.

Importing Drivers

——————

Now we need to import the drivers for Windows PE and OS deployment. To do this, follow these steps:

1. Right-click on the “Out-of-the-Box Drivers” item in the left menu, and select “Import Drivers”.

2. Point to the directory with the drivers and click “Next”.

3. Go ahead in the summary screen by clicking on “Next”.

4. You can ignore the warnings. Some 32-bit drivers are included. The 32-bit driver PVSCSI can be found on the “pvscsi-Windows2008.flp”. You can download this via WinSCP from a ESXi host. The 32-bit driver for VMXNET3 and SVGA is included and will be used for the Windows PE x86 image.

Conclusion

———-

In this article, we have covered the steps to configure MDT 2013 for deploying Windows 2008 R2. We have created a deployment share, imported OS images and drivers, and prepared the environment for deployment. In the next article, we will show how to create a task sequence and a VMware Tools package, which will be used for the actual deployment of Windows 2008 R2 via MDT 2013.

Sharing Limitations

‎Jul 15 2024

03:03 AM

As an administrator, I have been tasked with finding a solution to the issue of sharing folders within our organization. Specifically, we have multiple subfolders within our OneDrive folder that need to be shared with external parties without having to manually add each new email address. This is proving to be a time-consuming and inefficient process, as new collaborators are constantly being added to the project.

After researching this issue further, I discovered that our organization’s policies do not allow for external sharing of folders that require a log in. This means that even if we set the external sharing parameters to “Anyone,” as one user recently experienced, our colleagues will still be unable to share these folders with external parties.

To address this issue, I recommend implementing an alternative solution that allows for secure and efficient sharing of our subfolders with external collaborators. One potential solution is to use a third-party file-sharing service that offers more flexible collaboration features, such as Google Drive or Dropbox. These services allow users to easily share folders and files with external parties without the need for manual email addresses or organizational policies.

Another option would be to implement an access control list (ACL) within our OneDrive folder. This would allow us to grant specific permissions to different user groups, such as “read only” or “edit,” based on their role within the project. By doing so, we can ensure that external collaborators have the necessary permissions to access and edit the relevant subfolders without having to share the entire folder with them.

Furthermore, I suggest establishing clear guidelines and procedures for sharing folders and files with external parties. This could include creating a standardized template for sharing requests, setting up automated workflows for approvals and notifications, and providing training and support for users on how to properly share and collaborate on files.

In conclusion, while our organization’s policies do not currently allow for external sharing of folders that require a log in, there are alternative solutions and best practices that can be implemented to address this issue. By leveraging third-party file-sharing services, implementing ACLs within our OneDrive folder, and establishing clear guidelines for sharing and collaboration, we can improve the efficiency and security of our file-sharing processes and better support our external collaborators.