All
.NET
AD CS
AD DS
AD FS
Amazon Web Services (AWS)
Atlassian
Azure Arc
Azure Monitor
BGP
Blazor Server
brief
C#
Cheat Sheets
Check Point
Dell PowerEdge
DevOps
E-Mail
Exchange
Failover Clustering
Fax Server
FreeBSD
General
Google Cloud
Hype-Jargon
Hyper-V
IBM X3650
IEEE 802.11 WLAN
Infrastructure as Code (IaC)
IPv4 | IPv6
Juniper
Kubernetes
Let's Encrypt
Linux
Logical Volume Manager (LVM)
Microsoft 365 (Office 365)
Microsoft Azure
Microsoft Defender
Microsoft Entra
Microsoft Intune
Microsoft Teams
Monitoring
NetApp
Network File System (NFS)
Networks
OAuth2.0
OpenID Connect
Oracle Linux
pfSense
PKI
Postfix
PostgreSQL
PowerShell
Python
Red Hat
SAML 2.0
SAP
Security
Session Border Controller (SBC)
SLES
SQL Server
Storage
Sysinternals
System Center
TLS/SSL
Ubuntu
VEEAM
Virtual Machine Manager (VMM)
Visual Studio
VMware vSphere
VPN
Web server
Windows
X.509 PKI
Mastering GCP Virtual Machines – Part 5
In Part 4 we saw how GCP will encrypt the virtual disks of virtual machine instances. Further we saw how to export a disk from Google Cloud...
Mastering GCP Virtual Machines – Part 4
In Part 3 we saw how to create a new Windows virtual machine instance (Windows Server 2025) and how to...
Mastering Azure Monitor (Log Analytics) and Azure Resource Graph
In this post, we will see how Azure Monitor’s Log Analytics tool can be used to query different signals, from...
Mastering Azure Update Manager – Part 4
In Part 3 we saw how to patch SUSE Linux Enterprise by using the Azure Update Manager and some troubleshooting. Now in...
Azure Automation – Virtual Machine Start/Stop Schedule
Azure has a feature similar to GCP’s Schedule Instance, though it’s implemented a bit differently. Azure provides “Start/Stop VMs during...
Using Azure Key Vault for Passwords in Azure Bastion
Managing virtual machine access securely is a critical part of any Azure deployment. Azure Bastion provides a secure, browser-based RDP...