Skip to content

The Cyber Security, Compliance & Cloud

Cyber Security | Digital Transformation | Cloud Computing

  • Home
  • About Me
  • Contact Me:
The Cyber Security, Compliance & Cloud

Author: Baz

Netapp SIS operations: compression and/or deduplication

January 28, 2015 Baz Netapp, Storage Leave a comment

The sis command manages SIS operations: compression and/or deduplication. Data compression can be used on-the-fly, and/or as a scheduled background operation. This

Continue reading

Scheduling log files deletion on server with forfiles

January 21, 2015 Baz Exchange, scripts, windows Leave a comment

The following batch file uses “Forfiles.exe” for deleting files from the mentioned path. Forfiles.exe is supported only by Windows Vista,

Continue reading

Replacing Default Server Certificates with Self-Signed Certificates

January 19, 2015 Baz VMWare Leave a comment

VMware recommends that you replace default certificates with those signed by commercial certificate authority. Make sure to deploy new certificate

Continue reading

Replacing Default Vcenter Server Certificates with signed by a CCA

January 19, 2015 Baz VMWare Leave a comment

VMware recommends that you replace default certificates with those signed by commercial certificate authority. Make sure to deploy new certificate

Continue reading

Updating VMware Tools fails with the error , Editing vmx file

January 18, 2015 Baz VMWare Leave a comment

You may receive error during VMware tool update, The reason for this is that upgrading VMware tools within guest is

Continue reading

Reinitializing the vCenter Server database ; vCenter slow or does not start

January 7, 2015 Baz VMWare Leave a comment

If the vCenter service is in a stopped state (when it should be started or  vCenter Server does not start.

Continue reading

Virtual Center server randomly loses its connection to ESXi servers; Restarting management network

January 7, 2015 Baz VMWare Leave a comment

If ESXi console does not respond at all after logging in or you Unable to restart the management agents on

Continue reading

Network redundancy message (This host currently has no management network redundancy)

January 7, 2015 Baz VMWare Leave a comment

After configuring a vSphere cluster for High Availability you might see this message on the summary page of your hosts

Continue reading

ESXi Log Files

January 7, 2015 Baz tech, tips, VMWare Leave a comment

ESXi Log Files ·  /var/log/auth.log: ESXi Shell authentication success and failure attempts. ·  /var/log/dhclient.log: DHCP client log. · /var/log/esxupdate.log: ESXi

Continue reading

Installing ODBC for VCenter Components on Windows Server 2012

January 1, 2015 Baz SQL, VMWare Leave a comment

In this part we will create the DSNs.The three vCenter components which are using databases are Single Sign On, vCenter

Continue reading

Posts pagination

«Previous Posts 1 … 3 4 5 6 7 … 14 Next Posts»

Categories

ADADFSAmazonAppleAppsArticlesAWSAzureAzure PolicyAzure PurviewbackupCertificatesCiscoCloudComplianceCyberSecuritydamwaredataData GovernanceDigital ForensicexcelExchangeflashflexGPOHadoopHPInformation ProtectionIntelligent securityJSON

Recent Posts

  • The Ultimate Cybersecurity Certification Roadmap for 2025
  • Marks & Spencer (M&S), Co-op Group and Harrods cyber attack – Technical Analysis
  • Top 25 Most Dangerous Software Errors and Mitigations- CWE
  • Datbricks vs SQL Server
  • Designing SQL Database in Azure
  • Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault
  • Azure Sentinel: The connectors grand (CEF, Syslog, Direct, Agent, Custom and more)
  • Cloud Adoption and Audit Planning
  • Digital Forensic & E-Discovery (Legal Hold) Types

Top Cyber Security Posts

Datbricks vs SQL Server

April 14, 2023

Designing SQL Database in Azure

February 21, 2023

Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault

December 13, 2022

FIDO – FIDO2: an open authentication standard

June 20, 2022

Build next-generation security operations with Azure Sentinel

December 16, 2020

How to Apply Microsoft Information Protection’s (MIP) sensitivity labels to Azure assets in Azure Purview

December 4, 2020

The Cyber Security, Compliance & Cloud

  • The Ultimate Cybersecurity Certification Roadmap for 2025
  • Marks & Spencer (M&S), Co-op Group and Harrods cyber attack – Technical Analysis
  • Top 25 Most Dangerous Software Errors and Mitigations- CWE
  • Datbricks vs SQL Server
  • Designing SQL Database in Azure
  • Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault
  • Azure Sentinel: The connectors grand (CEF, Syslog, Direct, Agent, Custom and more)
  • Cloud Adoption and Audit Planning
  • Digital Forensic & E-Discovery (Legal Hold) Types
  • FIDO – FIDO2: an open authentication standard
WordPress Theme: Tortuga by ThemeZee.