Five Security Measures you can put in place to improve the security of M365 Business Standard
Business Email Compromise - Risk, Challenge, Prevention and Response
Ransomware's risk to an organization cash flow
What the heck are Native and Allowed VLANs?
What are the minimum security components to achieve a reasonable level of security?
How to setup MCLAG Trunks between FortiSwitch and VMware
LDAP and SD-WAN Trouble...
How to exclude sites from SSL Inspection
How to modify outbound routing decisions for BGP
Comparison of ADVPN to Hub & Spoke and Full Mesh
How to fix this odd error where FortiManager tries to install a certificate that isn't valid
A bit about TCL and FortiManager and a Conversion Script I wrote
Build and Plan for a Home Lab
Quick, Basic SD-WAN Setup
A Model for a Well Organized, Well Managed Network
What are Hashes For?
Comparison of the different components of the Cryptographic Cipher Suites
An explanation of Cipher Suite Naming
List of DNS Tools I've found useful
Setting up DNSSEC
How the DNS Protocol Returns Data
A Better Analogy For Explaining DNS?
How to setup NTP for Windows
Find Azure Market Place Image Offers
Use AZ PowerShell module to find VM Images available by Publisher
How to use PowerShell to check a file hash
Resolve remote host names
User PowerShell to stop all processes with the same name
Red Hat Enterprise Linux Training Notes
Use PowerShell to test connection to a port
PowerShell script that checks AD logs for last logon of all domain joined computers