All
.NET
AD CS
AD DS
AD FS
Amazon Web Services (AWS)
Atlassian
Azure Arc
BGP
Blazor Server
brief
C#
Dell PowerEdge
DevOps
E-Mail
Exchange
Failover Clustering
Fax Server
FreeBSD
General
Google Cloud
Hype-Jargon
Hyper-V
IBM X3650
IEEE 802.11 WLAN
Infrastructure as Code (IaC)
IPv4 | IPv6
Kubernetes
Let's Encrypt
Linux
Logical Volume Manager (LVM)
Microsoft 365 (Office 365)
Microsoft Azure
Microsoft Defender
Microsoft Entra
Microsoft Intune
Microsoft Teams
Monitoring
Network File System (NFS)
Networks
OAuth2.0
OpenID Connect
pfSense
PKI
Postfix
PostgreSQL
PowerShell
Python
Red Hat
SAML 2.0
SAP
Security
Session Border Controller (SBC)
SLES
SQL Server
Storage
Sysinternals
System Center
TLS/SSL
Ubuntu
VEEAM
Virtual Machine Manager (VMM)
Visual Studio
VMware vSphere
VPN
Web server
Windows
X.509 PKI
Infrastructure as Code (IaC) – Part 2 – Azure Resource Manager (ARM) templates
In this post I want to summarize about what Azure Resource Manager templates (ARM templates) are and how you can...
Infrastructure as Code (IaC) – Part 1
This post is the beginning of a series about several tools and services for provisioning and managing on-premises and cloud...
Azure Migrate – How to migrate on-premises Hyper-V Virtual Machines to Azure
In this post we will see how to migrate on-premises Hyper-V VMs to Azure by using Azure Migrate and the...
Offboarding Microsoft 365 Hybrid – Move to Cloud Only
In this post we will see how to move from a Microsoft 365 Hybrid environment to a Microsoft 365 cloud...
How Azure AD Privileged Identity Management works?
Privileged Identity Management (PIM) is a service in Azure Active Directory (Azure AD) which you can use to control and...
Network Security Groups (NSG) vs. Application Security Groups (ASG)
In Azure you can use a network security group to filter network traffic between Azure resources in an Azure virtual...