All
.NET
AD CS
AD DS
AD FS
Amazon Web Services (AWS)
Atlassian
Azure Arc
BGP
Blazor Server
brief
C#
Cheat Sheets
Dell PowerEdge
DevOps
E-Mail
Exchange
Failover Clustering
Fax Server
FreeBSD
General
Google Cloud
Hype-Jargon
Hyper-V
IBM X3650
IEEE 802.11 WLAN
Infrastructure as Code (IaC)
IPv4 | IPv6
Kubernetes
Let's Encrypt
Linux
Logical Volume Manager (LVM)
Microsoft 365 (Office 365)
Microsoft Azure
Microsoft Defender
Microsoft Entra
Microsoft Intune
Microsoft Teams
Monitoring
Network File System (NFS)
Networks
OAuth2.0
OpenID Connect
Oracle Linux
pfSense
PKI
Postfix
PostgreSQL
PowerShell
Python
Red Hat
SAML 2.0
SAP
Security
Session Border Controller (SBC)
SLES
SQL Server
Storage
Sysinternals
System Center
TLS/SSL
Ubuntu
VEEAM
Virtual Machine Manager (VMM)
Visual Studio
VMware vSphere
VPN
Web server
Windows
X.509 PKI
Set up Microsoft Defender for Identity
In this post I want to show what Microsoft Defender for Identity is and how you can set up and configure it....
Set up Microsoft Defender for Office 365
In this post I want to give you a summary about what Microsoft Defender for Office 365 is exactly and...
Default outbound access for VMs in Azure will be retired on 30 September 2025 – How to transition to an explicit method of public connectivity
Because default outbound access for VMs in Azure will be retired on 30 September 2025, I want to take a...
How Azure AD Privileged Identity Management works?
Privileged Identity Management (PIM) is a service in Azure Active Directory (Azure AD) which you can use to control and...
Enroll Windows Computer into Microsoft Intune
Microsoft Intune is a cloud-based endpoint management solution. It manages user access and simplifies app and device management across your...
How to reveal hidden WLANs (Hidden SSID)
By default all WLAN access points send out their SSIDs in beacon frames as shown below in the screenshot. These...