
Often customer get stuck with designs that were modern for the era of time they first were implemented, and then new features cannot be utilized or cannot be utilized to their fully potential. Security isRead More
Often customer get stuck with designs that were modern for the era of time they first were implemented, and then new features cannot be utilized or cannot be utilized to their fully potential. Security isRead More
I was working for a customer who needed to upgrade their Nexus switches, Yeah, you guessed it right! It was a nightmare after the network engineer had resigned and the consultant was hired to solveRead More
Recently I received a comment from someone asking me to share my solution for Index Management for ELK. This comment was posted on the blog post regarding how to monitor firewall traffic using Elastic stackRead More
Recently I received a comment from someone asking me to share my solution for Index Management for ELK. This comment was posted on the blog post regarding how to monitor firewall traffic using Elastic stackRead More
Well this is quite a generic error that you might encounter with a lot of different products. However, I was so lucky that I got this error while working with Microsoft Powerautomate, Which was alsoRead More
During my carrier I have configured Microsoft Local administrator password solution many times. But as there has been gaps or breaks between each time implement this for a customer I have to go through myRead More
Today we will be focusing hos Palo alto network firewalls Host information profile (HIP). For those of you have been in the game for some time might find some resemblance with Microsoft’s Network Policy ServerRead More
Continuing on security and CIS controls, from my other blog post describing monitoring of DHCP using ELK, one of the other important aspects is to know what is installed on the computers and devices connectedRead More
More than often I run into customers who have this situation where they cannot or do not have visibility within a network, by a network in this context I am referring to a layer twoRead More
I was thinking about the title for this post, should it be MFA or just use Radius authentication? For most network guys the choice will simply fall on radius authentication, while for most IT-Pros, notRead More