Skip to content

The Cyber Security, Compliance & Cloud

Cyber Security | Digital Transformation | Cloud Computing

  • Home
  • About Me
  • Contact Me:
The Cyber Security, Compliance & Cloud

Clients not Reporting into WSUS Server

June 18, 2015 Baz scripts, tech, tips, windows Leave a comment

Create the Batch file with following code and run to fix the problem net stop wuauserv regsvr32 /s wuapi.dll regsvr32

Continue reading

World Wide Publishing Service Windows Process Activation Service Won’t Start ,

June 18, 2015 Baz tech, tips, windows Leave a comment

The World Wide Web Publishing Service service depends on the Windows Process Activation Service service which failed to start because

Continue reading

Backing up ESXi host configuration

June 9, 2015 Baz VMWare Leave a comment

vCli, or Virtual command Line Interface is a free tool from VMware, and it’s 25+ cmdlets that allows you to

Continue reading

Remove Failed/offline Domain controllers from Active Directory Manually Method 2

April 8, 2015 Baz AD, scripts, windows Leave a comment

‘Dcpromo’ is used to install and uninstall Domain controllers, however if domain controllers is crash and unable to run dcpromo

Continue reading

Migrating On-Premises SQL Databases to AWS RDS Cloud

March 18, 2015 Baz AWS, data, SQL Leave a comment

Migrating from an on-premises, self- hosted SQL database to AWS Relational Database (RDS) can be scary business. Migrating to AWS RDS

Continue reading

Flexible Single Master Operation Roles (FSMO) in AD

February 9, 2015 Baz AD, ADFS, networking, windows Leave a comment

Active Directory has five special roles which are vital for the smooth running of AD as a multimaster system. Some

Continue reading

Oncommand System Manager (netapp) fails to connect to storage controllers TLS Error

January 29, 2015 Baz Netapp, Storage Leave a comment

 TLS Erro recevied 500 Connection refused‘ or ‘Controller not configured for secure management with tls‘   Symptoms When the storage

Continue reading

Upgrade Netapp Data ONTAP Version

January 28, 2015 Baz Netapp, Storage Leave a comment

Upgrade Netapp Data ONTAP   I am Upgrading form 8.1.2 7-Mode to 8.1.4P7 7-Mode 1.       Review Data ONTAP Release Notes

Continue reading

Netapp SIS operations: compression and/or deduplication

January 28, 2015 Baz Netapp, Storage Leave a comment

The sis command manages SIS operations: compression and/or deduplication. Data compression can be used on-the-fly, and/or as a scheduled background operation. This

Continue reading

Scheduling log files deletion on server with forfiles

January 21, 2015 Baz Exchange, scripts, windows Leave a comment

The following batch file uses “Forfiles.exe” for deleting files from the mentioned path. Forfiles.exe is supported only by Windows Vista,

Continue reading

Posts pagination

«Previous Posts 1 … 6 7 8 9 10 … 18 Next Posts»

Categories

ADADFSAmazonAppleAppsArticlesAWSAzureAzure PolicyAzure PurviewbackupCertificatesCiscoCloudComplianceCyberSecuritydamwaredataData GovernanceDigital ForensicexcelExchangeflashflexGPOHadoopHPInformation ProtectionIntelligent securityJSON

Recent Posts

  • The Ultimate Cybersecurity Certification Roadmap for 2025
  • Marks & Spencer (M&S), Co-op Group and Harrods cyber attack – Technical Analysis
  • Top 25 Most Dangerous Software Errors and Mitigations- CWE
  • Datbricks vs SQL Server
  • Designing SQL Database in Azure
  • Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault
  • Azure Sentinel: The connectors grand (CEF, Syslog, Direct, Agent, Custom and more)
  • Cloud Adoption and Audit Planning
  • Digital Forensic & E-Discovery (Legal Hold) Types

Top Cyber Security Posts

Datbricks vs SQL Server

April 14, 2023

Designing SQL Database in Azure

February 21, 2023

Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault

December 13, 2022

FIDO – FIDO2: an open authentication standard

June 20, 2022

Build next-generation security operations with Azure Sentinel

December 16, 2020

How to Apply Microsoft Information Protection’s (MIP) sensitivity labels to Azure assets in Azure Purview

December 4, 2020

The Cyber Security, Compliance & Cloud

  • The Ultimate Cybersecurity Certification Roadmap for 2025
  • Marks & Spencer (M&S), Co-op Group and Harrods cyber attack – Technical Analysis
  • Top 25 Most Dangerous Software Errors and Mitigations- CWE
  • Datbricks vs SQL Server
  • Designing SQL Database in Azure
  • Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault
  • Azure Sentinel: The connectors grand (CEF, Syslog, Direct, Agent, Custom and more)
  • Cloud Adoption and Audit Planning
  • Digital Forensic & E-Discovery (Legal Hold) Types
  • FIDO – FIDO2: an open authentication standard
WordPress Theme: Tortuga by ThemeZee.