Advanced Search
Search Results
75 total results found
"Waiting For Connection To Cash Register" on Ingenico CBA EFTPOS machine
Step-by-step guide on what to do if this message is displayed on an Ingenico CBA EFTPOS machine. Check if the USB B cable (usually red head) is plugged in. Unplug and plug USB B cable back in. If need be you can reset the EFTPOS machine. To do this hold...
Programming Button on your Phone
Step-by-step guide With the phone in the cradle press the feature button. Click the button you wish to program (bottom three rows only). Enter the number or speed dial you want to program in (remember you need to add the 0 if the number is outside...
Setting up voicemail on your desk phone
The below instructions will assist you with setting up the voicemail on your desk phone for the first time. Step-by-step guide Dial 799 Enter your security code (0000 for first time until you set your own) Follow the prompts, you will be asked the follow...
Checking Desk Phone Voicemail Messages
You must have first setup your desk phone voicemail message bank. Please refer to Setting up voicemail on your desk phone. To check your voicemail messages on your desk phone you can follow the below instructions. Step-by-step guide Dial 799 to access...
Editing Voicemail Settings
Once you have setup your voicemail on your desk phone you can edit it at any time by following the below steps. Step-by-step guide Dial 799 Enter your security code and wait approx. 10 seconds You’ll hear the statement to ‘Remember Yes for 1 and 2 for No...
Setting up voicemail on your desk phone
The below instructions will assist you with setting up the voicemail on your desk phone for the first time. Step-by-step guide Dial 799 Enter your security code (0000 for first time until you set your own) Follow the prompts, you will be asked the follow...
Kilvington IP Phones
The IT and Marketing teams locate at Kilvington Drive use NEC DT800 IP handsets as desk phones These phones are connected to the core switch stack in the Kilvington comms rooms and are configured to use VLAN mode on both the LAN and PC ports. The phones are...
Banned and Restricted Applications on PBR Devices
Overview PBR-issued devices are managed through Microsoft Intune (Company Portal). Certain applications are prohibited on PBR devices for security, legal, or compliance reasons. Prohibited Applications ApplicationReason TikTokProhibited under Australian Gove...
Adding an Additional Mailbox in Outlook on the Web
If a user has access to an additional/shared mailbox they can add it to their Office365 web mail. Step-by-step guide Sign in to your account in Outlook on the web. For Exchange Online mailboxes, right-click Folders in the left navigation pane, and t...
Setting Up Duo MFA (IT Staff and Select Roles)
Overview Duo MFA is used only by IT staff and a small number of select roles — primarily for systems that integrate with Duo, such as NetSuite. If you are a general PBR staff member, please use Microsoft Authenticator instead — see Setting Up Microsoft Authent...
Change Desk Phone Name Display
These are extension from 700- 799 only (for other ranges, please contact the Telephone Supervisor) Web browse to http://10.10.1.51:61000Credentials in 1Pass - NEC Web Portal Name Change Go To Top Menu for Admin Menu, the side Menu for User Management. The scre...
Setting Up Microsoft Authenticator (Standard MFA)
Overview Multi-Factor Authentication (MFA) protects your PBR account by requiring a second verification step when you sign in. Microsoft Authenticator is the standard MFA method for all PBR staff. You will need your mobile phone to complete this setup. If you ...
Overview & Repository Layout
Purpose This book documents PBR's Ansible-based configuration management for Linux infrastructure. It covers the ssh-baseline role, supporting playbooks, design rationale, deployment procedure, and operational reference. The ssh-baseline role establishes a h...
Architecture & Design Decisions
Purpose of this Page This page captures the rationale behind every non-obvious design choice in the ssh-baseline role. Each entry follows the pattern: What we did → Why → Trade-off accepted. Where possible, comments inside the role itself reference these dec...
Deployment Runbook — New Host
When to Use This Runbook Follow this runbook when adding a new Ubuntu host to the SSH baseline. The procedure assumes: The host runs Ubuntu 22.04 or 24.04 LTS (the role's supported versions) The host has a real hostname (not ubuntu or localhost) The host ca...
Configuration Reference
Variable Source Hierarchy Variables resolve in standard Ansible precedence order. The role uses three layers: Role defaults — roles/ssh-baseline/defaults/main.yml (lowest precedence; the safe baseline) Group vars — inventory/group_vars/all/main.yml (organis...
AD Integration & SSSD
Overview The role integrates Ubuntu hosts with Active Directory via SSSD using realm join. Once joined, AD users authenticate via Kerberos (with their AD password), are authorised via AD group membership, and have their SSH public keys retrieved from the sshP...
Duo MFA Integration
Scope Duo MFA is enforced in two places: SSH login (v2.3+) — via PAM keyboard-interactive after publickey auth sudo (v2.4+) — via PAM at the auth phase, with AD password as the post-Duo factor The role uses Duo Security's official duo-unix package, not Ub...