The primary intended use of this blog is to share IT related tips and tricks based on experience. I have studied Computers since high school and was very interested in technology in general while growing up. No, no I am not a Generation-X og Generation-Y person! I am born in the early 80’s so that rules out that part. I am blessed to work with technology that I adore and what I am fascinated by, so to cut the chase, this blog is supposed to give something back to the IT community. I feel like I am getting old, as I am reaching my forties, so I feel a bit obligated to share my experience with the young guns and some of the newbies within the IT field.
IT Pro in making!
I have been working as an IT consultant for the last 15 years, gathering experience along the path and starting where most of us IT-Pros start i.e.
1. IT support technician
2. Senior IT support technician
3. Junior IT administrator
4. Senior IT administrator
5. Junior IT Consultant
6. Senior IT Consultant
Area of expertise!
Well to simply list the products that I work with or have worked with during my time as IT pro include:
Microsoft Active Directory (AD DS), Domain naming system (DNS), Dynamic Host Configuration Protocol (DHCP), Network Time Protocol (NTP), Group policies (GPO), Public Key infrastructure (PKI), Distributed file system (DFS), Simple mail transfer protocol (SMTP), Radius server (RAS), Direct Access, System center Configuration Manager (SCCM), System center Operations Manager (SCOM), System center Service Manager (SCSM), Windows deployment service (WDS), Microsoft Deployment Kit (MDT), MS SQL, Microsoft Exchange, Windows Server 2003, Windows server 2008, Windows server 2012, Windows server 2016, Windows server 2019, Windows 98, Windows ME, Windows XP, Windows 7, Windows Vista, Windows 7, Windows 10, Sharepoint on-prem and Sharepoint Online, Azure AD, Office 365, Powershell, VB scripting….
Cisco catalyst switches and ASA firewalls. Extreme Switches, along with PaloAlto Network firewalls and Checkpoint firewalls. Fiber based and copper based networks.
This includes numerous MFA products like RSA, Microsoft MFA, Duo security etc. Vmware vCenter and Hyper-V, SAN’s mostly IBM based and some Microsoft based on SOFS. Monitoring tools and SELM solutions like Splunk and ELK stack. Other things worth mentioning are general architecture and design of IT systems.
My latest technical blog posts
- Cross vCenter vMotion-VMware vSphere 7.x VM migrationOften customer get stuck with designs that were modern for the era of time they first were implemented, and then new features cannot be utilized or cannot be utilized to their fully potential. Security isRead More
- Upgrading Nexus 3548X-Cisco Nexus switchesI was working for a customer who needed to upgrade their Nexus switches, Yeah, you guessed it right! It was a nightmare after the network engineer had resigned and the consultant was hired to solveRead More
- Elasticsearch Cluster for – Monitoring Palo alto firewallsRecently I received a comment from someone asking me to share my solution for Index Management for ELK. This comment was posted on the blog post regarding how to monitor firewall traffic using Elastic stackRead More
- Index Management for ELK – monitoring Palo alto firewallsRecently I received a comment from someone asking me to share my solution for Index Management for ELK. This comment was posted on the blog post regarding how to monitor firewall traffic using Elastic stackRead More
- Specified object not found in the storeWell this is quite a generic error that you might encounter with a lot of different products. However, I was so lucky that I got this error while working with Microsoft Powerautomate, Which was alsoRead More
- Configuring Microsoft LAPSDuring my carrier I have configured Microsoft Local administrator password solution many times. But as there has been gaps or breaks between each time implement this for a customer I have to go through myRead More
- GlobalProtect HIP configuration Palo alto network firewallsToday we will be focusing hos Palo alto network firewalls Host information profile (HIP). For those of you have been in the game for some time might find some resemblance with Microsoft’s Network Policy ServerRead More
- Computer inventory and asset information using Powershell and WMIContinuing on security and CIS controls, from my other blog post describing monitoring of DHCP using ELK, one of the other important aspects is to know what is installed on the computers and devices connectedRead More
- Windows firewall logging with ELK and LogstashMore than often I run into customers who have this situation where they cannot or do not have visibility within a network, by a network in this context I am referring to a layer twoRead More
- Palo alto firewall with DUO MFAI was thinking about the title for this post, should it be MFA or just use Radius authentication? For most network guys the choice will simply fall on radius authentication, while for most IT-Pros, notRead More
My latest travel blog posts
Beside being a nerd I also like travelling out in the nature. Here are some of my blog posts regarding these places. Especially worth reading if you are intending to travel to Norway or Oslo in particular.
- Oslo treasures Liggeren
- Oslo summits Gaupekollen
- Øyungen Queen of Nordmarka
- Oslo summits Furumokollen
- Oslo summits Øyungskollen