Synced files: - Complete claude-projects import (5 catalog files) - Client directory with 12 clients - Project directory with 12 projects - Credentials updated (100+ sets) - Session logs consolidated - Agent coordination rules updated - Task management integration Major work completed: - Exhaustive cataloging of claude-projects - All session logs analyzed (38 files) - All credentials extracted and organized - Client infrastructure documented - Problem solutions cataloged (70+) Machine: ACG-M-L5090 Timestamp: 2026-01-26 16:45:54 Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
837 lines
28 KiB
Markdown
837 lines
28 KiB
Markdown
# Client Directory
|
|
|
|
**Generated:** 2026-01-26
|
|
**Purpose:** Comprehensive directory of all MSP clients with infrastructure, work history, and credentials
|
|
**Source:** CATALOG_CLIENTS.md, CATALOG_SESSION_LOGS.md
|
|
|
|
---
|
|
|
|
## Table of Contents
|
|
|
|
1. [AZ Computer Guru (Internal)](#az-computer-guru-internal)
|
|
2. [BG Builders LLC](#bg-builders-llc)
|
|
3. [CW Concrete LLC](#cw-concrete-llc)
|
|
4. [Dataforth Corporation](#dataforth-corporation)
|
|
5. [Glaztech Industries](#glaztech-industries)
|
|
6. [Grabb & Durando](#grabb--durando)
|
|
7. [Khalsa](#khalsa)
|
|
8. [MVAN Inc](#mvan-inc)
|
|
9. [RRS Law Firm](#rrs-law-firm)
|
|
10. [Scileppi Law Firm](#scileppi-law-firm)
|
|
11. [Sonoran Green LLC](#sonoran-green-llc)
|
|
12. [Valley Wide Plastering](#valley-wide-plastering)
|
|
|
|
---
|
|
|
|
## AZ Computer Guru (Internal)
|
|
|
|
### Company Information
|
|
- **Type:** Internal Operations
|
|
- **Status:** Active
|
|
- **Domain:** azcomputerguru.com
|
|
- **Service Area:** Statewide (Arizona - Tucson, Phoenix, Prescott, Flagstaff)
|
|
- **Phone:** 520.304.8300
|
|
|
|
### Infrastructure
|
|
|
|
#### Physical Servers
|
|
| Server | IP | OS | Role | Access |
|
|
|--------|-----|-----|------|--------|
|
|
| Jupiter | 172.16.3.20 | Unraid | Primary container host | root / Th1nk3r^99## |
|
|
| Saturn | 172.16.3.21 | Unraid | Secondary storage | root / r3tr0gradE99 |
|
|
| Build Server (gururmm) | 172.16.3.30 | Ubuntu 22.04 | GuruRMM, PostgreSQL | guru / Gptf*77ttb123!@#-rmm |
|
|
| pfSense | 172.16.0.1 | FreeBSD/pfSense 2.8.1 | Firewall, VPN | admin / r3tr0gradE99!! |
|
|
| WebSvr | websvr.acghosting.com | cPanel | WHM/cPanel hosting | root / r3tr0gradE99# |
|
|
| IX | 172.16.3.10 | cPanel | WHM/cPanel hosting | root / Gptf*77ttb!@#!@# |
|
|
|
|
#### Network Configuration
|
|
- **LAN Subnet:** 172.16.0.0/22
|
|
- **Tailscale Network:** 100.x.x.x/32 (mesh VPN)
|
|
- pfSense: 100.119.153.74 (hostname: pfsense-2)
|
|
- ACG-M-L5090: 100.125.36.6
|
|
- **WAN (Fiber):** 98.181.90.163/31
|
|
- **Public IPs:** 72.194.62.2-10, 70.175.28.51-57
|
|
|
|
#### Services
|
|
| Service | External URL | Internal | Purpose |
|
|
|---------|--------------|----------|---------|
|
|
| Gitea | git.azcomputerguru.com | 172.16.3.20:3000 | Git server |
|
|
| GuruRMM | rmm-api.azcomputerguru.com | 172.16.3.30:3001 | RMM platform |
|
|
| NPM | - | 172.16.3.20:7818 | Nginx Proxy Manager |
|
|
| Seafile | sync.azcomputerguru.com | 172.16.3.21 | File sync |
|
|
|
|
### Work History
|
|
|
|
#### 2025-12-12
|
|
- Tailscale fix on pfSense after upgrade
|
|
- WebSvr security: Blocked 10 IPs via Imunify360
|
|
- Disk cleanup: Freed 58GB (86% to 80%)
|
|
- DNS fix: Added A record for data.grabbanddurando.com
|
|
|
|
#### 2025-12-14
|
|
- SSL certificate: Added rmm-api.azcomputerguru.com to NPM
|
|
- Session logging improvements
|
|
- Rust installation on WSL
|
|
- SSH key generation and distribution
|
|
|
|
#### 2025-12-16 (Multiple Sessions)
|
|
- GuruRMM dashboard deployed to build server
|
|
- Auto-update system implemented for agent
|
|
- Binary replacement bug fix (rename-then-copy pattern)
|
|
- MailProtector deployed on WebSvr and IX
|
|
|
|
#### 2025-12-21
|
|
- Temperature metrics added to agent v0.5.1
|
|
- CI/CD pipeline created with webhook handler
|
|
- Policy system designed (Client → Site → Agent)
|
|
- Authorization system implemented (Phases 1-2)
|
|
|
|
#### 2025-12-25
|
|
- pfSense hardware migration to Intel N100
|
|
- Tailscale firewall rules made permanent
|
|
- SeaFile and Scileppi data migration monitoring
|
|
|
|
### Credentials
|
|
**See:** credentials.md sections:
|
|
- Infrastructure - SSH Access (Jupiter, Saturn, pfSense, Build Server, WebSvr, IX)
|
|
- Services - Web Applications (Gitea, NPM, Cloudflare)
|
|
- Projects - GuruRMM (Database, API, SSO, CI/CD)
|
|
- MSP Tools (Syncro, Autotask, CIPP)
|
|
|
|
### Status
|
|
- **Active:** Production infrastructure operational
|
|
- **Development:** GuruRMM Phase 1 MVP in progress
|
|
- **Pending Tasks:**
|
|
- GuruRMM agent architecture support (ARM, different OS versions)
|
|
- Repository optimization (ensure all remotes point to Gitea)
|
|
- Clean up old Tailscale entries
|
|
- Windows SSH keys for Jupiter and RS2212+ direct access
|
|
- NPM proxy for rmm.azcomputerguru.com SSO dashboard
|
|
|
|
---
|
|
|
|
## BG Builders LLC
|
|
|
|
### Company Information
|
|
- **Type:** Client - Construction
|
|
- **Status:** Active
|
|
- **Domain:** bgbuildersllc.com
|
|
- **Related Entity:** Sonoran Green LLC (same M365 tenant)
|
|
|
|
### Infrastructure
|
|
|
|
#### Microsoft 365
|
|
- **Tenant ID:** ededa4fb-f6eb-4398-851d-5eb3e11fab27
|
|
- **onmicrosoft.com:** sonorangreenllc.onmicrosoft.com
|
|
- **Admin User:** sysadmin@bgbuildersllc.com
|
|
- **Password:** Window123!@#-bgb
|
|
- **Licenses:**
|
|
- 8x Microsoft 365 Business Standard
|
|
- 4x Exchange Online Plan 1
|
|
- 1x Microsoft 365 Basic
|
|
- **Security Gap:** No advanced security features (no conditional access, Intune, or Defender)
|
|
- **Recommendation:** Upgrade to Business Premium
|
|
|
|
#### DNS Configuration (Cloudflare)
|
|
- **Zone ID:** 156b997e3f7113ddbd9145f04aadb2df
|
|
- **Nameservers:** amir.ns.cloudflare.com, mckinley.ns.cloudflare.com
|
|
- **A Records:** 3.33.130.190, 15.197.148.33 (proxied) - GoDaddy Website Builder
|
|
|
|
#### Email Security Records (Configured 2025-12-19)
|
|
- **SPF:** `v=spf1 include:spf.protection.outlook.com -all`
|
|
- **DMARC:** `v=DMARC1; p=reject; rua=mailto:sysadmin@bgbuildersllc.com`
|
|
- **DKIM selector1:** CNAME to selector1-bgbuildersllc-com._domainkey.sonorangreenllc.onmicrosoft.com
|
|
- **DKIM selector2:** CNAME to selector2-bgbuildersllc-com._domainkey.sonorangreenllc.onmicrosoft.com
|
|
- **MX:** bgbuildersllc-com.mail.protection.outlook.com
|
|
|
|
### Work History
|
|
|
|
#### 2025-12-19 (Email Security Incident)
|
|
- **Incident:** Phishing email spoofing shelly@bgbuildersllc.com
|
|
- **Subject:** "Sonorangreenllc.com New Notice: All Employee Stipend..."
|
|
- **Investigation:** Account NOT compromised - external spoofing attack
|
|
- **Root Cause:** Missing DMARC and DKIM records
|
|
- **Response:**
|
|
- Verified no mailbox forwarding, inbox rules, or send-as permissions
|
|
- Added DMARC record with `p=reject` policy
|
|
- Configured DKIM selectors (selector1 and selector2)
|
|
- Email correctly routed to Junk folder by M365
|
|
|
|
#### 2025-12-19 (Cloudflare Migration)
|
|
- Migrated bgbuildersllc.com from GoDaddy to Cloudflare DNS
|
|
- Recovered original A records from GoDaddy nameservers
|
|
- Created 14 DNS records including M365 email records
|
|
- Preserved GoDaddy zone file for reference
|
|
|
|
#### 2025-12-22 (Security Investigation - Resolved)
|
|
- **Compromised User:** Shelly@bgbuildersllc.com (Shelly Dooley)
|
|
- **Findings:**
|
|
- Gmail OAuth app with EAS.AccessAsUser.All (REMOVED)
|
|
- "P2P Server" app registration backdoor (DELETED by admin)
|
|
- No malicious mailbox rules or forwarding
|
|
- Sign-in logs unavailable (no Entra P1 license)
|
|
- **Remediation:**
|
|
- Password reset: `5ecwyHv6&dP7` (must change on login)
|
|
- All sessions revoked
|
|
- Gmail OAuth consent removed
|
|
- P2P Server backdoor deleted
|
|
- **Status:** RESOLVED
|
|
|
|
### Credentials
|
|
- **M365 Tenant ID:** ededa4fb-f6eb-4398-851d-5eb3e11fab27
|
|
- **Admin User:** sysadmin@bgbuildersllc.com
|
|
- **Password:** Window123!@#-bgb
|
|
- **Cloudflare Zone ID:** 156b997e3f7113ddbd9145f04aadb2df
|
|
|
|
### Status
|
|
- **Active:** Email security hardening complete
|
|
- **Pending Tasks:**
|
|
- Create cPanel account for bgbuildersllc.com on IX server
|
|
- Update Cloudflare A records to IX server IP (72.194.62.5) after account creation
|
|
- Enable DKIM signing in M365 Defender
|
|
- Consider migrating sonorangreenllc.com to Cloudflare
|
|
|
|
### Important Dates
|
|
- **2025-12-19:** Email security hardening completed
|
|
- **2025-12-22:** Security incident resolved
|
|
- **2025-04-15:** Last password change for user accounts
|
|
|
|
---
|
|
|
|
## CW Concrete LLC
|
|
|
|
### Company Information
|
|
- **Type:** Client - Construction
|
|
- **Status:** Active
|
|
- **Domain:** cwconcretellc.com
|
|
|
|
### Infrastructure
|
|
|
|
#### Microsoft 365
|
|
- **Tenant ID:** dfee2224-93cd-4291-9b09-6c6ce9bb8711
|
|
- **Default Domain:** NETORGFT11452752.onmicrosoft.com
|
|
- **Licenses:**
|
|
- 2x Microsoft 365 Business Standard
|
|
- 2x Exchange Online Essentials
|
|
- **Security Gap:** No advanced security features
|
|
- **Recommendation:** Upgrade to Business Premium for Intune, conditional access, Defender
|
|
- **Notes:** De-federated from GoDaddy 2025-12, domain needs re-verification
|
|
|
|
### Work History
|
|
|
|
#### 2025-12-22 (Security Investigation - Resolved)
|
|
- **Findings:**
|
|
- Graph Command Line Tools OAuth consent with high privileges (REMOVED)
|
|
- "test" backdoor app registration with multi-tenant access (DELETED)
|
|
- Apple Internet Accounts OAuth (left - likely iOS device)
|
|
- No malicious mailbox rules or forwarding
|
|
- **Remediation:**
|
|
- All sessions revoked for all 4 users
|
|
- Backdoor apps removed
|
|
- **Status:** RESOLVED
|
|
|
|
#### 2025-12-23
|
|
- License analysis via CIPP API
|
|
- Security assessment completed
|
|
- Recommendation provided for Business Premium upgrade
|
|
|
|
### Credentials
|
|
- **M365 Tenant ID:** dfee2224-93cd-4291-9b09-6c6ce9bb8711
|
|
- **CIPP Name:** cwconcretellc.com
|
|
|
|
### Status
|
|
- **Active:** Security assessment complete
|
|
- **Pending Tasks:**
|
|
- Business Premium upgrade recommendation
|
|
- Domain re-verification in M365
|
|
|
|
---
|
|
|
|
## Dataforth Corporation
|
|
|
|
### Company Information
|
|
- **Type:** Client - Industrial Equipment Manufacturing
|
|
- **Status:** Active
|
|
- **Domain:** dataforth.com, intranet.dataforth.com
|
|
- **Business:** Industrial test equipment manufacturer
|
|
|
|
### Infrastructure
|
|
|
|
#### Network
|
|
- **LAN Subnet:** 192.168.0.0/24
|
|
- **Domain:** INTRANET (intranet.dataforth.com)
|
|
- **VPN Subnet:** 192.168.6.0/24
|
|
- **VPN Endpoint:** 67.206.163.122:1194/TCP
|
|
|
|
#### Servers
|
|
| Server | IP | Role | Credentials |
|
|
|--------|-----|------|-------------|
|
|
| UDM | 192.168.0.254 | Gateway/OpenVPN | root / Paper123!@#-unifi |
|
|
| AD1 | 192.168.0.27 | Primary DC, NPS/RADIUS | INTRANET\sysadmin / Paper123!@# |
|
|
| AD2 | 192.168.0.6 | Secondary DC, file server | INTRANET\sysadmin / Paper123!@# |
|
|
| D2TESTNAS | 192.168.0.9 | DOS machine SMB1 proxy | admin / Paper123!@#-nas |
|
|
|
|
#### Active Directory
|
|
- **Domain:** INTRANET
|
|
- **DNS:** intranet.dataforth.com
|
|
- **Admin:** INTRANET\sysadmin / Paper123!@#
|
|
|
|
#### RADIUS/NPS Configuration (AD1)
|
|
- **Server:** 192.168.0.27
|
|
- **Ports:** 1812/UDP (auth), 1813/UDP (accounting)
|
|
- **Shared Secret:** Gptf*77ttb!@#!@#
|
|
- **RADIUS Client:** unifi (192.168.0.254)
|
|
- **Network Policy:** "Unifi" - allows Domain Users 24/7
|
|
- **Auth Methods:** All (PAP, CHAP, MS-CHAP, MS-CHAPv2, EAP)
|
|
- **AuthAttributeRequired:** False (required for UniFi OpenVPN)
|
|
|
|
#### Microsoft 365
|
|
- **Tenant ID:** 7dfa3ce8-c496-4b51-ab8d-bd3dcd78b584
|
|
- **Admin:** sysadmin@dataforth.com / Paper123!@# (synced with AD)
|
|
|
|
#### Entra App Registration (Claude-Code-M365)
|
|
- **Purpose:** Silent Graph API access for automation
|
|
- **App ID:** 7a8c0b2e-57fb-4d79-9b5a-4b88d21b1f29
|
|
- **Client Secret:** tXo8Q~ZNG9zoBpbK9HwJTkzx.YEigZ9AynoSrca3
|
|
- **Created:** 2025-12-22
|
|
- **Expires:** 2027-12-22
|
|
- **Permissions:** Calendars.ReadWrite, Contacts.ReadWrite, User.ReadWrite.All, Mail.ReadWrite, Directory.ReadWrite.All, Group.ReadWrite.All, Sites.ReadWrite.All, Files.ReadWrite.All
|
|
|
|
### Work History
|
|
|
|
#### 2025-12-14 (DOS Test Machines Implementation)
|
|
- **Problem:** Crypto attack disabled SMB1 on production servers
|
|
- **Solution:** Deployed NetGear ReadyNAS as SMB1 proxy
|
|
- **Architecture:**
|
|
- DOS machines → NAS (SMB1) → AD2 (SMB2/3)
|
|
- Bidirectional sync every 15 minutes
|
|
- PULL: Test results → Database
|
|
- PUSH: Software updates → DOS machines
|
|
- **Features:**
|
|
- Remote task deployment (TODO.BAT)
|
|
- Centralized software management (UPDATE.BAT)
|
|
- **Machines Working:** TS-27, TS-8L, TS-8R
|
|
- **Machines Pending:** ~27 DOS machines need network config updates
|
|
- **Project Time:** ~11 hours implementation
|
|
|
|
#### 2025-12-20 (RADIUS/OpenVPN Setup)
|
|
- **Problem:** VPN connections failing with RADIUS authentication
|
|
- **Root Cause:** NPS required Message-Authenticator attribute, but UDM's pam_radius_auth doesn't send it
|
|
- **Solution:**
|
|
- Set NPS RADIUS client AuthAttributeRequired to False
|
|
- Created comprehensive OpenVPN client profiles (.ovpn)
|
|
- Configured split tunnel (no redirect-gateway)
|
|
- Added proper DNS configuration
|
|
- **Testing:** Successfully authenticated INTRANET\sysadmin via VPN
|
|
|
|
#### 2025-12-22 (John Lehman Mailbox Cleanup)
|
|
- **User:** jlehman@dataforth.com
|
|
- **Problem:** Duplicate calendar events and contacts causing Outlook sync issues
|
|
- **Investigation:** Created Entra app for persistent Graph API access
|
|
- **Results:**
|
|
- Deleted 175 duplicate recurring calendar series (kept newest)
|
|
- Deleted 476 duplicate contacts
|
|
- Deleted 1 blank contact
|
|
- 11 series couldn't be deleted (John is attendee, not organizer)
|
|
- **Cleanup Stats:**
|
|
- Contacts: 937 → 460 (477 removed)
|
|
- Recurring series: 279 → 104 (175 removed)
|
|
- **Post-Cleanup Issues:**
|
|
- Calendar categories lost (colors) - awaiting John's preferences
|
|
- Focused Inbox ML model reset - created 12 "Other" overrides
|
|
- **Follow-up:** Block New Outlook toggle via registry (HideNewOutlookToggle)
|
|
|
|
### Credentials
|
|
**See:** credentials.md sections:
|
|
- Client - Dataforth (UDM, AD1, AD2, D2TESTNAS, NPS RADIUS, Entra app)
|
|
- Projects - Dataforth DOS (Complete workflow documentation)
|
|
|
|
### Status
|
|
- **Active:** Ongoing support including RADIUS/VPN, AD, M365 management
|
|
- **DOS System:** 90% complete, operational
|
|
- **Pending Tasks:**
|
|
- John Lehman needs to reset Outlook profile for fresh sync
|
|
- Apply "Block New Outlook" registry fix on John's laptop
|
|
- Re-apply calendar categories based on John's preferences
|
|
- Datasheets share creation on AD2 (BLOCKED - waiting for Engineering)
|
|
- Update network config on remaining ~27 DOS machines
|
|
|
|
### Important Dates
|
|
- **2025-12-14:** DOS test machine system implemented
|
|
- **2025-12-20:** RADIUS/VPN authentication configured
|
|
- **2025-12-22:** Major mailbox cleanup for John Lehman
|
|
|
|
---
|
|
|
|
## Glaztech Industries
|
|
|
|
### Company Information
|
|
- **Type:** Client
|
|
- **Status:** Active
|
|
- **Domain:** glaztech.com
|
|
- **Subdomain (standalone):** slc.glaztech.com
|
|
|
|
### Infrastructure
|
|
|
|
#### Active Directory Migration Plan
|
|
- **Current:** slc.glaztech.com standalone domain (~12 users/computers)
|
|
- **Recommendation:** Manual migration to glaztech.com using OUs for site segmentation
|
|
- **Reason:** Small environment, manual migration more reliable than ADMT
|
|
|
|
#### Firewall GPO Scripts (Created 2025-12-18)
|
|
- **Purpose:** Ransomware protection via firewall segmentation
|
|
- **Files:**
|
|
- Configure-WorkstationFirewall.ps1 - Blocks workstation-to-workstation traffic
|
|
- Configure-ServerFirewall.ps1 - Restricts workstation access to servers
|
|
- Configure-DCFirewall.ps1 - Secures Domain Controller access
|
|
- Deploy-FirewallGPOs.ps1 - Creates and links GPOs
|
|
|
|
### Work History
|
|
|
|
#### 2025-12-18
|
|
- AD migration planning: Recommended manual migration approach
|
|
- Firewall GPO scripts created for ransomware protection
|
|
- GuruRMM testing: Attempted legacy agent deployment on 2008 R2
|
|
|
|
#### 2025-12-21
|
|
- **GuruRMM Site Code:** DARK-GROVE-7839 configured
|
|
- **Compatibility Issue:** Agent fails silently on Server 2008 R2 (missing VC++ Runtime or incompatible APIs)
|
|
- **Likely Culprits:** sysinfo, local-ip-address crates using newer Windows APIs
|
|
|
|
### Credentials
|
|
- **GuruRMM:**
|
|
- Client ID: d857708c-5713-4ee5-a314-679f86d2f9f9
|
|
- Site: SLC - Salt Lake City
|
|
- Site ID: 290bd2ea-4af5-49c6-8863-c6d58c5a55de
|
|
- Site Code: DARK-GROVE-7839
|
|
- API Key: grmm_Qw64eawPBjnMdwN5UmDGWoPlqwvjM7lI
|
|
|
|
### Status
|
|
- **Active:** AD planning, firewall hardening, GuruRMM deployment
|
|
- **Pending Tasks:**
|
|
- Plan slc.glaztech.com to glaztech.com AD migration
|
|
- Deploy firewall GPO scripts after testing
|
|
- Resolve GuruRMM agent 2008 R2 compatibility issues
|
|
|
|
---
|
|
|
|
## Grabb & Durando
|
|
|
|
### Company Information
|
|
- **Type:** Client - Law Firm
|
|
- **Status:** Active
|
|
- **Domain:** grabbanddurando.com
|
|
- **Related:** grabblaw.com
|
|
|
|
### Infrastructure
|
|
|
|
#### IX Server (WHM/cPanel)
|
|
- **Internal IP:** 172.16.3.10
|
|
- **Public IP:** 72.194.62.5
|
|
- **cPanel Account:** grabblaw
|
|
- **Database:** grabblaw_gdapp_data
|
|
- **Database User:** grabblaw_gddata
|
|
- **Password:** GrabbData2025
|
|
|
|
#### data.grabbanddurando.com
|
|
- **Record Type:** A
|
|
- **Value:** 72.194.62.5
|
|
- **TTL:** 600 seconds
|
|
- **SSL:** Let's Encrypt via AutoSSL
|
|
- **Site Admin:** admin / GND-Paper123!@#-datasite
|
|
|
|
### Work History
|
|
|
|
#### 2025-12-12 (DNS & SSL Fix)
|
|
- **Problem:** data.grabbanddurando.com not resolving
|
|
- **Solution:** Added A record via WHM API
|
|
- **SSL Issue:** Wrong certificate being served (serveralias conflict)
|
|
- **Resolution:**
|
|
- Removed conflicting serveralias from data.grabbanddurando.grabblaw.com vhost
|
|
- Added as proper subdomain to grabblaw cPanel account
|
|
- Ran AutoSSL to get Let's Encrypt cert
|
|
- Rebuilt Apache config and restarted
|
|
|
|
#### 2025-12-12 (Database Sync from GoDaddy VPS)
|
|
- **Problem:** DNS was pointing to old GoDaddy VPS, users updated data there Dec 10-11
|
|
- **Old Server:** 208.109.235.224
|
|
- **Missing Records Found:**
|
|
- activity table: 4 records (18539 → 18543)
|
|
- gd_calendar_events: 1 record (14762 → 14763)
|
|
- gd_assign_users: 2 records (24299 → 24301)
|
|
- **Solution:** Synced all missing records using mysqldump with --replace option
|
|
- **Verification:** All tables now match between servers
|
|
|
|
#### 2025-12-16 (Calendar Event Creation Fix)
|
|
- **Problem:** Calendar event creation failing due to MySQL strict mode
|
|
- **Root Cause:** Empty strings for auto-increment columns
|
|
- **Solution:** Replaced empty strings with NULL for MySQL strict mode compliance
|
|
|
|
### Credentials
|
|
**See:** credentials.md section:
|
|
- Client Sites - WHM/cPanel (IX Server, data.grabbanddurando.com)
|
|
|
|
### Status
|
|
- **Active:** Database and calendar maintenance complete
|
|
- **Important Dates:**
|
|
- 2025-12-10 to 2025-12-11: Data divergence period (users on old GoDaddy VPS)
|
|
- 2025-12-12: Data sync and DNS fix completed
|
|
- 2025-12-16: Calendar fix applied
|
|
|
|
---
|
|
|
|
## Khalsa
|
|
|
|
### Company Information
|
|
- **Type:** Client
|
|
- **Status:** Active
|
|
|
|
### Infrastructure
|
|
|
|
#### Network
|
|
- **Primary LAN:** 192.168.0.0/24
|
|
- **Alternate Subnet:** 172.16.50.0/24
|
|
- **VPN:** 192.168.1.0/24
|
|
- **External IP:** 98.175.181.20
|
|
- **OpenVPN Port:** 1194/TCP
|
|
|
|
#### UCG (UniFi Cloud Gateway)
|
|
- **Management IP:** 192.168.0.1
|
|
- **Alternate IP:** 172.16.50.1 (br2 interface)
|
|
- **SSH:** root / Paper123!@#-camden
|
|
- **SSH Key:** ~/.ssh/khalsa_ucg (guru@wsl-khalsa)
|
|
|
|
#### Switch
|
|
- **User:** 8WfY8
|
|
- **Password:** tI3evTNBZMlnngtBc
|
|
|
|
#### Accountant Machine (KMS-QB)
|
|
- **IP:** 172.16.50.168 (dual-homed on both subnets)
|
|
- **Hostname:** KMS-QB
|
|
- **User:** accountant / Paper123!@#-accountant
|
|
- **Local Admin:** localadmin / r3tr0gradE99!
|
|
- **RDP:** Enabled (accountant added to Remote Desktop Users)
|
|
- **WinRM:** Enabled
|
|
|
|
### Work History
|
|
|
|
#### 2025-12-22 (VPN RDP Access Fix)
|
|
- **Problem:** VPN clients couldn't RDP to 172.16.50.168
|
|
- **Root Causes:**
|
|
1. RDP not enabled (TermService not listening)
|
|
2. Windows Firewall blocking RDP from VPN subnet (192.168.1.0/24)
|
|
3. Required services not running (UmRdpService, SessionEnv)
|
|
- **Solution:**
|
|
1. Added SSH key to UCG for remote management
|
|
2. Verified OpenVPN pushing correct routes
|
|
3. Enabled WinRM on target machine
|
|
4. Added firewall rule for RDP from VPN subnet
|
|
5. Started required services (UmRdpService, SessionEnv)
|
|
6. Rebooted machine to fully enable RDP listener
|
|
7. Added 'accountant' user to Remote Desktop Users group
|
|
- **Testing:** RDP access confirmed working from VPN
|
|
|
|
### Credentials
|
|
**See:** credentials.md section:
|
|
- Client - Khalsa (UCG, Switch, Accountant Machine)
|
|
|
|
### Status
|
|
- **Active:** VPN and RDP troubleshooting complete
|
|
- **Important Dates:**
|
|
- 2025-12-22: VPN RDP access fully configured and tested
|
|
|
|
---
|
|
|
|
## MVAN Inc
|
|
|
|
### Company Information
|
|
- **Type:** Client
|
|
- **Status:** Active
|
|
|
|
### Infrastructure
|
|
|
|
#### Microsoft 365 Tenant 1
|
|
- **Tenant:** mvan.onmicrosoft.com
|
|
- **Admin User:** sysadmin@mvaninc.com
|
|
- **Password:** r3tr0gradE99#
|
|
- **Notes:** Global admin, project to merge/trust with T2
|
|
|
|
### Status
|
|
- **Active:** M365 tenant management
|
|
- **Project:** Tenant merge/trust with T2 (status unknown)
|
|
|
|
---
|
|
|
|
## RRS Law Firm
|
|
|
|
### Company Information
|
|
- **Type:** Client - Law Firm
|
|
- **Status:** Active
|
|
- **Domain:** rrs-law.com
|
|
|
|
### Infrastructure
|
|
|
|
#### Hosting
|
|
- **Server:** IX (172.16.3.10)
|
|
- **Public IP:** 72.194.62.5
|
|
|
|
#### Microsoft 365 Email DNS (Added 2025-12-19)
|
|
| Record | Type | Value |
|
|
|--------|------|-------|
|
|
| _dmarc.rrs-law.com | TXT | `v=DMARC1; p=quarantine; rua=mailto:admin@rrs-law.com` |
|
|
| selector1._domainkey | CNAME | selector1-rrslaw-com0i._domainkey.rrslaw.d-v1.dkim.mail.microsoft |
|
|
| selector2._domainkey | CNAME | selector2-rrslaw-com0i._domainkey.rrslaw.d-v1.dkim.mail.microsoft |
|
|
|
|
### Work History
|
|
|
|
#### 2025-12-19
|
|
- **Problem:** Email DNS records incomplete for Microsoft 365
|
|
- **Solution:** Added DMARC and both DKIM selectors via WHM API
|
|
- **Verification:** Both selectors verified by M365
|
|
- **Result:** DKIM signing enabled in M365 Admin Center
|
|
|
|
#### Final Email DNS Status
|
|
- MX → M365: Yes
|
|
- SPF (includes M365): Yes
|
|
- DMARC: Yes
|
|
- Autodiscover: Yes
|
|
- DKIM selector1: Yes
|
|
- DKIM selector2: Yes
|
|
- MS Verification: Yes
|
|
- Enterprise Registration: Yes
|
|
- Enterprise Enrollment: Yes
|
|
|
|
### Status
|
|
- **Active:** Email DNS configuration complete
|
|
- **Important Dates:**
|
|
- 2025-12-19: Complete M365 email DNS configuration
|
|
|
|
---
|
|
|
|
## Scileppi Law Firm
|
|
|
|
### Company Information
|
|
- **Type:** Client - Law Firm
|
|
- **Status:** Active
|
|
|
|
### Infrastructure
|
|
|
|
#### Network
|
|
- **Subnet:** 172.16.1.0/24
|
|
- **Gateway:** 172.16.0.1 (pfSense via Tailscale)
|
|
|
|
#### Storage Systems
|
|
| System | IP | Role | Credentials | Status |
|
|
|--------|-----|------|-------------|--------|
|
|
| DS214se | 172.16.1.54 | Source NAS (old) | admin / Th1nk3r^99 | Migration source |
|
|
| Unraid | 172.16.1.21 | Source server | root / Th1nk3r^99 | Migration source |
|
|
| RS2212+ | 172.16.1.59 | Destination NAS (new) | sysadmin / Gptf*77ttb123!@#-sl-server | Production |
|
|
|
|
#### RS2212+ (SL-SERVER)
|
|
- **Storage:** 25TB total, 6.9TB used (28%)
|
|
- **Data Share:** /volume1/Data (7.9TB)
|
|
- **Hostname:** SL-SERVER
|
|
- **SSH Key:** claude-code@localadmin added
|
|
|
|
#### User Accounts (Created 2025-12-29)
|
|
| Username | Full Name | Password | Notes |
|
|
|----------|-----------|----------|-------|
|
|
| chris | Chris Scileppi | Scileppi2025! | Owner |
|
|
| andrew | Andrew Ross | Scileppi2025! | Staff |
|
|
| sylvia | Sylvia | Scileppi2025! | Staff |
|
|
| rose | Rose | Scileppi2025! | Staff |
|
|
|
|
### Work History
|
|
|
|
#### 2025-12-23 (Migration Start)
|
|
- **Setup:** Enabled User Home Service on DS214se
|
|
- **Setup:** Enabled rsync service on DS214se
|
|
- **SSH Keys:** Generated on RS2212+, added to DS214se authorized_keys
|
|
- **Permissions:** Fixed home directory permissions (chmod 700)
|
|
- **Migration:** Started parallel rsync from DS214se and Unraid
|
|
- **Speed Issue:** Initially 1.5 MB/s, improved to 5.4 MB/s after switch port move
|
|
- **Network Issue:** VLAN 5 misconfiguration caused temporary outage
|
|
|
|
#### 2025-12-23 (Network Recovery)
|
|
- **Tailscale:** Re-authenticated after invalid key error
|
|
- **pfSense SSH:** Added SSH key for management
|
|
- **VLAN 5:** Diagnosed misconfiguration (wrong parent interface igb0 instead of igb2, wrong netmask /32 instead of /24)
|
|
- **Migration:** Automatically resumed after network restored
|
|
|
|
#### 2025-12-26
|
|
- **Migration Progress:** 6.4TB transferred (~94% complete)
|
|
- **Estimated Completion:** ~0.4TB remaining
|
|
|
|
#### 2025-12-29 (Migration Complete & Consolidation)
|
|
- **Status:** Migration and consolidation COMPLETE
|
|
- **Final Structure:**
|
|
- Active: 2.5TB (merged Unraid + DS214se Open Cases)
|
|
- Closed: 4.9TB (merged Unraid + DS214se Closed Cases)
|
|
- Archived: 451GB
|
|
- MOTIONS BANK: 21MB
|
|
- Billing: 17MB
|
|
- **Recycle Bin:** Emptied (recovered 413GB)
|
|
- **Permissions:** Group "users" with 775 on /volume1/Data
|
|
- **User Accounts:** Created 4 user accounts (chris, andrew, sylvia, rose)
|
|
|
|
### Credentials
|
|
**See:** credentials.md section:
|
|
- Client - Scileppi Law Firm (DS214se, Unraid, RS2212+, User accounts)
|
|
|
|
### Status
|
|
- **Active:** Migration and consolidation complete
|
|
- **Pending Tasks:**
|
|
- Monitor user access and permissions
|
|
- Verify data integrity
|
|
- Decommission DS214se after final verification
|
|
- Backup RS2212+ configuration
|
|
|
|
### Important Dates
|
|
- **2025-12-23:** Migration started (both sources)
|
|
- **2025-12-23:** Network outage (VLAN 5 misconfiguration)
|
|
- **2025-12-26:** ~94% complete (6.4TB of 6.8TB)
|
|
- **2025-12-29:** Migration and consolidation COMPLETE
|
|
|
|
---
|
|
|
|
## Sonoran Green LLC
|
|
|
|
### Company Information
|
|
- **Type:** Client - Construction
|
|
- **Status:** Active
|
|
- **Domain:** sonorangreenllc.com
|
|
- **Primary Entity:** BG Builders LLC
|
|
|
|
### Infrastructure
|
|
|
|
#### Microsoft 365
|
|
- **Tenant:** Shared with BG Builders LLC (ededa4fb-f6eb-4398-851d-5eb3e11fab27)
|
|
- **onmicrosoft.com:** sonorangreenllc.onmicrosoft.com
|
|
|
|
#### DNS Configuration
|
|
- **Current Status:**
|
|
- Nameservers: Still on GoDaddy (not migrated to Cloudflare)
|
|
- A Record: 172.16.10.200 (private IP - problematic)
|
|
- Email Records: Properly configured for M365
|
|
|
|
#### Needed Records (Not Yet Applied)
|
|
- DMARC: `v=DMARC1; p=reject; rua=mailto:sysadmin@bgbuildersllc.com`
|
|
- DKIM selector1: CNAME to selector1-sonorangreenllc-com._domainkey.sonorangreenllc.onmicrosoft.com
|
|
- DKIM selector2: CNAME to selector2-sonorangreenllc-com._domainkey.sonorangreenllc.onmicrosoft.com
|
|
|
|
### Work History
|
|
|
|
#### 2025-12-19
|
|
- **Investigation:** Shared tenant with BG Builders identified
|
|
- **Assessment:** DMARC and DKIM records missing
|
|
- **Status:** DNS records prepared but not yet applied
|
|
|
|
### Status
|
|
- **Active:** Related entity to BG Builders LLC
|
|
- **Pending Tasks:**
|
|
- Migrate domain to Cloudflare DNS
|
|
- Fix A record (pointing to private IP)
|
|
- Apply DMARC and DKIM records
|
|
- Enable DKIM signing in M365 Defender
|
|
|
|
---
|
|
|
|
## Valley Wide Plastering
|
|
|
|
### Company Information
|
|
- **Type:** Client - Construction
|
|
- **Status:** Active
|
|
- **Domain:** VWP.US
|
|
|
|
### Infrastructure
|
|
|
|
#### Network
|
|
- **Subnet:** 172.16.9.0/24
|
|
|
|
#### Servers
|
|
| Server | IP | Role | Credentials |
|
|
|--------|-----|------|-------------|
|
|
| UDM | 172.16.9.1 | Gateway/firewall | root / Gptf*77ttb123!@#-vwp |
|
|
| VWP-DC1 | 172.16.9.2 | Primary DC, NPS/RADIUS | sysadmin / r3tr0gradE99# |
|
|
|
|
#### Active Directory
|
|
- **Domain:** VWP.US (NetBIOS: VWP)
|
|
- **Hostname:** VWP-DC1.VWP.US
|
|
- **Users OU:** OU=VWP_Users,DC=VWP,DC=US
|
|
|
|
#### NPS RADIUS Configuration (VWP-DC1)
|
|
- **Server:** 172.16.9.2
|
|
- **Ports:** 1812 (auth), 1813 (accounting)
|
|
- **Shared Secret:** Gptf*77ttb123!@#-radius
|
|
- **AuthAttributeRequired:** Disabled (required for UniFi OpenVPN)
|
|
- **RADIUS Clients:**
|
|
- UDM (172.16.9.1)
|
|
- VWP-Subnet (172.16.9.0/24)
|
|
- **Network Policy:** "VPN-Access" - allows all authenticated users (24/7)
|
|
- **Auth Methods:** All (PAP, CHAP, MS-CHAP, MS-CHAPv2, EAP)
|
|
- **User Dial-in:** All VWP_Users set to msNPAllowDialin=True
|
|
|
|
#### VPN Users with Access (27 total)
|
|
Darv, marreola, farias, smontigo, truiz, Tcapio, bgraffin, cguerrero, tsmith, tfetters, owner, cougar, Receptionist, Isacc, Traci, Payroll, Estimating, ARBilling, orders2, guru, sdooley, jguerrero, kshoemaker, rose, rguerrero, jrguerrero, Acctpay
|
|
|
|
### Work History
|
|
|
|
#### 2025-12-22 (RADIUS/VPN Setup)
|
|
- **Objective:** Configure RADIUS authentication for VPN (similar to Dataforth)
|
|
- **Installation:** Installed NPS role on VWP-DC1
|
|
- **Configuration:** Created RADIUS clients for UDM and VWP subnet
|
|
- **Network Policy:** Created "VPN-Access" policy allowing all authenticated users
|
|
|
|
#### 2025-12-22 (Troubleshooting & Resolution)
|
|
- **Issue 1:** Message-Authenticator invalid (Event 18)
|
|
- Fix: Set AuthAttributeRequired=No on RADIUS clients
|
|
- **Issue 2:** Dial-in permission denied (Reason Code 65)
|
|
- Fix: Set all VWP_Users to msNPAllowDialin=True
|
|
- **Issue 3:** Auth method not enabled (Reason Code 66)
|
|
- Fix: Added all auth types to policy, removed default deny policies
|
|
- **Issue 4:** Default policy catching requests
|
|
- Fix: Deleted "Connections to other access servers" policy
|
|
|
|
#### Testing Results
|
|
- **Success:** VPN authentication working with AD credentials
|
|
- **Test User:** cguerrero (or INTRANET\sysadmin)
|
|
- **NPS Event:** 6272 (Access granted)
|
|
|
|
### Credentials
|
|
**See:** credentials.md section:
|
|
- Client - Valley Wide Plastering (UDM, VWP-DC1, NPS RADIUS configuration)
|
|
|
|
### Status
|
|
- **Active:** RADIUS/VPN setup complete
|
|
- **Important Dates:**
|
|
- 2025-12-22: Complete RADIUS/VPN configuration and testing
|
|
|
|
---
|
|
|
|
## Summary Statistics
|
|
|
|
### Client Counts
|
|
- **Total Clients:** 12 (including internal)
|
|
- **Active Clients:** 12
|
|
- **M365 Tenants:** 6 (BG Builders, CW Concrete, Dataforth, MVAN, RRS, Scileppi)
|
|
- **Active Directory Domains:** 3 (Dataforth, Valley Wide, Glaztech)
|
|
|
|
### Infrastructure Overview
|
|
- **Domain Controllers:** 3 (Dataforth AD1/AD2, VWP-DC1)
|
|
- **NAS Devices:** 4 (Scileppi RS2212+, DS214se, Unraid, Dataforth D2TESTNAS)
|
|
- **Network Gateways:** 4 (Dataforth UDM, VWP UDM, Khalsa UCG, pfSense)
|
|
- **RADIUS Servers:** 2 (Dataforth AD1, VWP-DC1)
|
|
- **VPN Endpoints:** 3 (Dataforth, VWP, Khalsa)
|
|
|
|
### Work Categories
|
|
- **Security Incidents:** 3 (BG Builders - resolved, CW Concrete - resolved, Dataforth - mailbox cleanup)
|
|
- **Email DNS Projects:** 2 (BG Builders, RRS)
|
|
- **Network Infrastructure:** 3 (Dataforth DOS, VWP RADIUS, Khalsa VPN)
|
|
- **Data Migrations:** 1 (Scileppi - complete)
|
|
|
|
---
|
|
|
|
**Last Updated:** 2026-01-26
|
|
**Source Files:** CATALOG_CLIENTS.md, CATALOG_SESSION_LOGS.md
|
|
**Status:** Complete import from claude-projects catalogs
|