The Engine Room
WANTED: A straight answer about how enterprise platforms actually work. Last seen buried somewhere between a vendor's marketing page and a 400-page admin guide nobody has time to read. This section covers the technology each vendor provides — what it is, why it exists, and how it works before you ever open a console. Organised by vendor rather than function, because Hyper-V is a Microsoft problem and ESXi is a VMware problem and pretending otherwise helps nobody.
Windows Server, Active Directory, Hyper-V, Azure Arc, Intune, Microsoft 365 — the full Microsoft infrastructure stack from domain controllers and Group Policy to hybrid cloud and containers.
Active Directory — How Windows Domains Work
ACTIVE-DIRECTORYActive Directory is the identity and access management backbone of virtually every on-premises Windows enterprise environment. Understanding what a domain controller actually does, how forests and trusts work, and why AD relies on Kerberos and DNS explains the foundation that everything from file shares to VPN authentication is built on.
Domain Controllers — The Pillars of AD DS
AD DSDomain Controllers are the servers that make Active Directory work. This article covers what a DC does, how FSMO roles are distributed across the domain, the purpose of Read-Only Domain Controllers, and how to deploy DCs in Azure-connected hybrid environments.
AD DS Sites and Replication — How Identity Spreads Across the Network
AD DSAD DS replication is not a simple broadcast — it is a topology-aware system built around sites, site links, and an automatic topology generator. This article explains how changes propagate across domain controllers, how SYSVOL replication works, and how to diagnose replication failures.
AD DS Trusts — Crossing Domain and Forest Boundaries
AD DSActive Directory trusts define the boundaries across which authentication and resource access can flow. This article covers trust direction, transitivity, the major trust types, and the security controls — SID filtering and selective authentication — that constrain what a trust actually permits.
Group Managed Service Accounts — Passwords Active Directory Manages for You
AD DSService accounts with manually managed passwords are a persistent security liability. Group Managed Service Accounts (gMSAs) solve this by having Active Directory generate, rotate, and distribute complex passwords automatically, with no human ever knowing the credential.
Entra ID — Microsoft's Cloud Identity Platform
ENTRA-IDEntra ID (formerly Azure Active Directory) is Microsoft's cloud-based identity and access management service. It is not simply 'AD in the cloud' — it has a fundamentally flat structure with no OUs, uses OAuth 2.0 and OIDC instead of Kerberos, and is built around modern authentication concepts like conditional access and identity protection.
Hybrid Identity — Bridging On-Premises AD and Entra ID
HYBRID-IDENTITYMost enterprise environments aren't purely on-premises or purely cloud — they're hybrid. Microsoft Entra Connect synchronises on-premises Active Directory identities to Entra ID so users can authenticate to both with the same credentials. Understanding the three sync modes and their security trade-offs determines whether a phished password can be used against cloud resources.
Entra Connect Cloud Sync — Lightweight Hybrid Identity
ENTRA IDEntra Connect Cloud Sync is a provisioning agent that synchronises on-premises Active Directory identities to Microsoft Entra ID without requiring a dedicated sync server. This article covers its architecture, supported scenarios, limitations compared to full Entra Connect, and how to decide which tool fits your environment.
Entra Connect Health — Monitoring Your Hybrid Identity Pipeline
ENTRA IDHybrid identity failures are often silent — a sync error or DC issue can break cloud access for hundreds of users before anyone notices. Entra Connect Health provides centralised monitoring of the sync pipeline, domain controllers, and AD FS infrastructure, surfacing problems before they become outages.
Group Policy — Configuration at Domain Scale
GROUP-POLICYGroup Policy Objects (GPOs) are the primary mechanism for pushing configuration to every Windows machine and user in an Active Directory domain — from password complexity requirements and mapped drives to software installation and security baselines. Understanding how GPO inheritance and the LSDOU processing order works explains why a setting on a laptop isn't behaving the way the admin intended.
Windows Admin Center — Modern Remote Management for Windows Server
WACWindows Admin Center is a browser-based management interface that consolidates most Server Manager and MMC console tasks into a single, extension-driven web UI. It operates in either gateway mode (centralised) or desktop mode (local) and integrates natively with Azure hybrid services.
PowerShell Remoting — Remote Administration at Scale
POWERSHELLPowerShell Remoting uses the WinRM protocol to execute commands on remote machines, enabling both interactive sessions and parallel batch operations across large server fleets. Just Enough Administration (JEA) extends this model with constrained endpoints that delegate specific capabilities to non-administrator accounts.
Azure Arc — Managing Non-Azure Machines from Azure
AZURE ARCAzure Arc extends the Azure management plane to servers running anywhere — on-premises data centres, third-party clouds, or edge locations — by installing a lightweight agent that registers each machine as an Azure resource. Once onboarded, Arc-enabled servers are subject to the same Azure Policy, RBAC, and monitoring tooling as native Azure VMs.
Update Management — Keeping Windows Server Patched at Scale
WSUSUnpatched servers remain the most common vector for infrastructure compromise. This article covers the evolution from on-premises WSUS through to Azure Update Manager, and explains how to think about patch rings, maintenance windows, and compliance reporting across a hybrid server fleet.
Microsoft Defender for Cloud — Security Posture and Threat Protection
DEFENDERMicrosoft Defender for Cloud combines cloud security posture management (CSPM) with cloud workload protection (CWP) into a single service. It continuously assesses your Azure, hybrid, and multi-cloud environments, produces a quantified secure score, and provides active threat detection through integration with Microsoft Defender for Endpoint.
Azure Automation and DSC — Runbooks, Drift Prevention, and Hybrid Workers
AUTOMATIONAzure Automation is a cloud service for process automation and configuration management across Azure, on-premises, and multi-cloud environments. Runbooks automate repetitive operational tasks, while Desired State Configuration (DSC) declaratively defines and enforces server configuration — detecting and correcting drift without human intervention.
Microsoft Intune — Cloud-Based Endpoint Management
INTUNEMicrosoft Intune is the cloud-based MDM and MAM platform that replaces on-premises SCCM for device management in modern Microsoft 365 deployments. It enrolls and manages Windows, macOS, iOS, and Android devices — pushing configuration, enforcing compliance, deploying apps, and wiping lost devices — without requiring a VPN or on-premises infrastructure.
Endpoint Imaging — Deploying Windows at Scale
IMAGINGImaging is the process of deploying a pre-configured Windows installation to multiple machines. The toolchain has evolved from WDS (unicast/multicast network PXE boot) through MDT (task sequences, driver injection, application installation) to Windows Autopilot (cloud-first, no custom image required). Understanding the full stack explains why enterprises choose each approach and where they're headed.
Hyper-V — Microsoft's Hypervisor
HYPER-VHyper-V is Microsoft's Type 1 hypervisor, built into Windows Server and Windows 10/11 Pro. Unlike ESXi which runs on dedicated hardware, Hyper-V integrates with Windows Server to provide virtualisation alongside the existing management infrastructure — Active Directory, SCOM, SCVMM. Understanding the parent/child partition model, virtual switches, and Failover Clustering explains how Windows-centric shops build resilient virtualised infrastructure.
Hyper-V Networking — Virtual Switches, NIC Teaming, and SR-IOV
HYPER-VHyper-V's virtual network stack translates physical network hardware into a flexible, software-defined layer that VMs and the host management OS share. Understanding vSwitch types, NIC teaming strategies, and hardware offload technologies like SR-IOV and RDMA is essential for designing performant and resilient virtualised infrastructure.
Hyper-V High Availability — Live Migration, Failover Clustering, and Replica
HYPER-VHigh availability for Hyper-V workloads is not a single feature but a stack of complementary technologies each addressing a different failure scenario. Live Migration handles planned downtime, Failover Clustering responds to unplanned host failures, and Hyper-V Replica provides site-level disaster recovery — understanding when each applies is fundamental to designing resilient virtualised infrastructure.
Windows Containers — Isolation Without the Hypervisor Overhead
CONTAINERSWindows containers package applications and their dependencies into portable, isolated units that share the host OS kernel rather than emulating full hardware. Understanding the two isolation modes, the available base images, and how Windows containers fit into a broader Kubernetes or Docker deployment is essential for modernising Windows Server workloads.
Windows Server DNS — Name Resolution for Hybrid Infrastructure
DNSWindows Server DNS is not simply a DNS server that happens to run on Windows — its deep integration with Active Directory DS makes it the authoritative foundation for domain authentication, service location, and secure dynamic registration. Understanding AD-integrated zones, SRV record dependencies, and hybrid forwarding patterns is essential for any Windows infrastructure role.
Windows Server DHCP — IP Address Assignment at Scale
DHCPWindows Server DHCP extends the base DHCP protocol with Active Directory integration, failover redundancy, and centralised management features that make it suitable for enterprise-scale deployments. Understanding scope design, option precedence, failover modes, and the relay agent model is foundational for any Windows Server infrastructure role.
IPAM — Centralised IP Address Management in Windows Server
IPAMWindows Server IPAM provides a centralised view of IP address space, DHCP scope state, and DNS zone data across the entire infrastructure from a single management point. Understanding what IPAM manages, how it discovers infrastructure, and where its limitations lie is important for evaluating when it meets enterprise needs and when a third-party solution is required.
Network Policy Server — RADIUS Authentication for Network Access
NPSNetwork Policy Server is Microsoft's RADIUS implementation, providing centralised authentication, authorisation, and accounting for 802.1X wired and wireless access, VPN, and other network access scenarios. Understanding how NPS policies are structured, which EAP methods apply to which use cases, and how the Azure MFA extension extends NPS capabilities is foundational for securing network access in Windows environments.
Remote Access — VPN, DirectAccess, and Always On VPN
RRASWindows Server's Remote Access role has evolved from simple dial-up routing through RRAS VPN and DirectAccess to the modern Always On VPN architecture. Each technology was designed for a different threat model and management approach, and understanding the architectural differences — not just the configuration — explains when each applies and why Always On VPN is the current standard for managed Windows devices.
Web Application Proxy — Publishing Internal Apps Securely
WAPWeb Application Proxy is a Remote Access role service in Windows Server that publishes internal web applications and services to external users without placing servers in a DMZ or opening inbound firewall rules. It integrates tightly with AD FS to provide pre-authentication at the perimeter, ensuring unauthenticated requests never reach internal infrastructure.
Storage Spaces — Software-Defined Storage in Windows Server
STORAGEStorage Spaces is the software-defined storage layer built into Windows Server, enabling administrators to pool heterogeneous physical disks into a unified capacity pool and provision virtual disks with configurable resiliency. It decouples storage management from physical hardware, allowing flexible provisioning, tiering, and high availability without dedicated storage controllers.
Storage Replica — Block-Level Replication for Windows Server
STORAGEStorage Replica is a synchronous and asynchronous block-level volume replication feature built into Windows Server 2016 and later. It provides disaster recovery and high availability without third-party software by replicating storage at a level below the filesystem, making it applicable to any workload regardless of the data format stored on the volume.
DFS — Distributed File System Namespaces and Replication
DFSThe Distributed File System in Windows Server comprises two independently useful but complementary components: DFS Namespaces, which presents a unified virtual folder tree that maps to shares on multiple servers, and DFS Replication, which synchronises folder content between servers using an efficient delta-compression algorithm. Together they enable transparent, highly available file access across distributed environments.
Azure File Sync — Extend Windows File Servers to the Cloud
AZUREAzure File Sync synchronises Windows file server shares to Azure Files, creating a cloud-backed copy of on-premises data while allowing servers to cache only the most-accessed files locally through cloud tiering. It supports multi-server sync, enabling branch offices and remote sites to share file content via a common cloud endpoint without requiring direct server-to-server replication.
Data Deduplication — Eliminating Redundant Blocks on Windows Server
STORAGEData Deduplication identifies and eliminates redundant data chunks across files on a volume, storing each unique chunk only once and replacing duplicates with lightweight pointers. Running as a post-process background job, it reduces storage consumption on eligible volumes without impacting write performance, and delivers the most dramatic savings on workloads with inherently repetitive data such as VDI environments and general-purpose file shares.
Exchange Online — Microsoft 365 Email Architecture
EXCHANGE-ONLINEExchange Online is the hosted email and calendaring component of Microsoft 365. It replaced on-premises Exchange Server for most organisations, but the underlying concepts — mailbox databases, transport pipeline, connectors, DAGs — are still relevant even if Microsoft now manages the infrastructure. Understanding Exchange Online's architecture explains why email delivery sometimes fails and how to fix it.
Microsoft 365 Tenant — The Cloud Workplace Foundation
M365-TENANTAn M365 tenant is the top-level organisational boundary in Microsoft's cloud — a dedicated instance of Entra ID plus a subscription to Microsoft services. Understanding what a tenant is, how licenses map to services, and what the admin centres actually control is the prerequisite for everything from deploying Exchange Online to configuring Teams telephony.
Azure Monitor and Log Analytics — Observability for the Microsoft Stack
MONITORINGAzure Monitor is Microsoft's unified observability platform, collecting time-series metrics and structured log data from Azure resources, on-premises servers via Azure Arc, and applications. Log Analytics Workspaces serve as the central repository for log data, queried using the Kusto Query Language, while alert rules, workbooks, and integrations with Defender for Cloud make it the operational backbone for both cloud and hybrid Microsoft environments.
Microsoft 365 DNS Domains — Connecting Your Domain to the Cloud
M365Every Microsoft 365 tenant starts life with a .onmicrosoft.com domain, but real-world deployments require custom domain names. DNS is the bridge that proves ownership, routes mail, enables Teams, and ties every M365 workload to your organisation's identity.
Microsoft 365 Admin Roles — Delegating Without Giving Away the Keys
M365Microsoft 365 provides a layered set of administrative roles that allow organisations to delegate specific management tasks without granting blanket control. Understanding which role fits which responsibility is fundamental to operating a least-privilege environment.
Privileged Identity Management — Just-in-Time Admin Access
PIMPrivileged Identity Management converts permanent admin role assignments into time-limited, approval-gated activations. It is the primary tool Microsoft recommends for reducing the attack surface created by standing privileged access in an Entra ID tenant.
Administrative Units — Scoped Delegation in Entra ID
ENTRA IDAdministrative Units are containers in Entra ID that restrict an administrator's scope to a defined subset of users, groups, or devices. They solve the problem of over-broad role assignments in large organisations where different teams should only manage their own populations.
Conditional Access — Zero Trust Policy Enforcement for M365
ENTRA IDConditional Access is the Entra ID policy engine that evaluates every access request against a set of signals — user identity, device state, location, application, and risk level — before deciding whether to allow, block, or require additional verification. It is the primary technical control for implementing Zero Trust in Microsoft 365.
MFA and SSPR — Securing and Recovering Identities in Entra ID
ENTRA IDHow Multi-Factor Authentication and Self-Service Password Reset work together to protect identities and remove helpdesk dependency in Entra ID.
Entra ID Identity Protection — Detecting and Responding to Risky Sign-ins
ENTRA IDHow Entra ID Identity Protection uses Microsoft threat intelligence to detect compromised users and suspicious sign-ins, and what risk-based policies do about them.
Entra Password Protection — Banning Weak Passwords Across the Organisation
ENTRA IDHow Entra ID's banned password lists and Smart Lockout defend against predictable passwords and brute-force attacks, both in the cloud and on-premises Active Directory.
Microsoft 365 Defender — Extended Detection and Response for the M365 Stack
DEFENDERHow Microsoft 365 Defender unifies signals from across the M365 security stack into a single XDR platform, and what Defender for Office 365 does to protect email and collaboration.
Microsoft Purview — Data Governance and Compliance for M365
PURVIEWHow Microsoft Purview classifies sensitive data, enforces retention, prevents data loss, and supports legal and regulatory compliance across the Microsoft 365 estate.
Windows Autopilot — Cloud-First Device Provisioning
AUTOPILOTWindows Autopilot is a cloud service that transforms a factory-fresh Windows device into a fully configured corporate endpoint without IT ever touching the hardware. The four deployment modes cover everything from standard employee onboarding to kiosk provisioning to warehouse pre-staging.
Windows Update for Business — Managing Updates Without WSUS
WINDOWSWindows Update for Business (WUfB) is a policy-driven service that controls when Windows 10/11 devices receive quality and feature updates directly from Microsoft. No on-premises WSUS server required — deferral periods, deadlines, and update rings give organisations predictable update delivery without local infrastructure.
Intune Enrollment — Getting Devices Under Management
INTUNEBefore Intune can deliver policies, apps, or compliance checks to a device, the device must be enrolled. Enrollment establishes the management relationship and installs the MDM agent. The method varies by platform and ownership model — from fully automated Autopilot flows for new Windows devices to user-initiated Company Portal enrollment for BYOD.
Intune Compliance Policies — Defining and Enforcing Device Health Standards
INTUNECompliance policies define the minimum security state a device must be in to be considered trustworthy. Intune evaluates the device against the policy and reports a compliance state — which Conditional Access in Entra ID then uses as a gate for accessing corporate resources.
Intune App Deployment — Delivering and Managing Applications at Scale
INTUNEIntune supports multiple application types with different trade-offs in flexibility, packaging complexity, and supported platforms. Win32 apps offer the most control for traditional Windows software; Microsoft 365 Apps deploy Office without installation media; MSIX provides modern clean packaging. Assignment intents and dependency chains let administrators model the full application lifecycle from delivery to supersedence.
Microsoft Defender Antivirus — Built-in Endpoint Protection for Windows
DEFENDERMicrosoft Defender Antivirus is the built-in AV engine for Windows 10/11, active by default when no third-party product displaces it. Managed through Intune, GPO, or ConfigMgr, it provides real-time scanning, cloud-delivered verdicts, Attack Surface Reduction rules, Controlled Folder Access, and Network Protection — all tunable from a single Endpoint Security policy.
BitLocker — Full Disk Encryption for Windows Endpoints
BITLOCKERBitLocker is Windows' built-in full volume encryption feature, protecting data on lost or stolen devices by encrypting the entire OS and data volumes with AES. Integrated with the TPM for transparent unlock, managed through Intune for silent deployment, and tied to Entra ID for automatic recovery key escrow, BitLocker is the standard disk encryption solution for Intune-managed Windows estates.
Windows Hello for Business — Passwordless Authentication for the Enterprise
WHFBWindows Hello for Business replaces the password at Windows sign-in with a TPM-bound cryptographic key pair unlocked by biometric or PIN. The password is never transmitted, never replayable from the network, and never useful to a phisher. Deployed via Intune, it integrates with Entra ID and on-premises AD through several trust models suited to different infrastructure maturity levels.
Microsoft Defender for Endpoint — EDR and Device Protection
DEFENDER-FOR-ENDPOINTHow Microsoft Defender for Endpoint provides endpoint detection and response (EDR) across Windows, macOS, Linux, iOS, and Android — collecting behavioural telemetry, detecting threats post-breach, enabling investigation timelines, and automating remediation through the Microsoft 365 Defender portal.
Endpoint Analytics — Device Experience and Performance Insights
ENDPOINT-ANALYTICSHow Endpoint Analytics in Microsoft Intune measures the real-world performance and reliability of managed devices — tracking startup times, restart frequency, app reliability, and hardware readiness — giving IT teams data to proactively fix issues before users call the helpdesk.
Azure Subscriptions and Governance — Management Groups, Locks, and Tags
AZURE-GOVERNANCEHow Azure organises resources into a hierarchy of management groups, subscriptions, and resource groups — and how resource locks, tags, and cost management give administrators control over what gets deployed and what it costs.
Azure RBAC — Role-Based Access Control for Resources
AZURE-RBACHow Azure RBAC assigns permissions to identities at a specific scope — distinguishing Azure resource roles from Entra ID directory roles, how role assignments work, what the key built-in roles cover, and when to create custom roles.
Azure Policy — Enforcing Compliance at Scale
AZURE-POLICYHow Azure Policy evaluates resources against defined rules and automatically enforces compliance — from simple tag-enforcement to deploying missing configurations — and how policy initiatives bundle related policies for assignment at scale.
Azure Storage Accounts — Types, Replication, and Access Tiers
AZURE-STORAGEHow Azure Storage accounts work — choosing between Standard and Premium account types, selecting the right data redundancy option from LRS to GZRS, and using access tiers and lifecycle management policies to balance performance against cost.
Azure Blob Storage — Block Blobs, Versioning, and Data Protection
AZURE-BLOBHow Azure Blob Storage organises unstructured data into containers and blobs, the differences between block, append, and page blob types, and how features like versioning, soft delete, immutability policies, and object replication protect data from accidental loss.
Azure Files — Cloud File Shares and Azure File Sync
AZURE-FILESHow Azure Files provides fully managed SMB and NFS file shares in the cloud — and how Azure File Sync extends those shares to on-premises Windows servers with intelligent cloud tiering that keeps frequently accessed files local while archiving the rest.
Azure Storage Security — SAS Tokens, Keys, and Encryption
AZURE-STORAGE-SECURITYHow Azure Storage protects data at rest and in transit — through shared access signatures for delegated access, storage account keys and their rotation, Azure AD authentication for blob and file workloads, customer-managed encryption keys, and infrastructure encryption.
Azure Virtual Machines — Compute, Disks, and High Availability
AZURE-VMSHow Azure Virtual Machines work — choosing VM sizes for workload requirements, selecting the right managed disk type, and architecting for high availability using availability sets, availability zones, proximity placement groups, and Azure Bastion for secure access.
Azure VM Scale Sets — Autoscaling and Orchestration
AZURE-VMSSHow Azure Virtual Machine Scale Sets deploy and manage a group of identical VMs as a single resource — supporting manual scaling, metric-based autoscaling, and two orchestration modes that trade between strict uniformity and flexibility for mixing VM sizes and images.
Azure Container Instances and Container Registry — Running Containers Without Kubernetes
AZURE-CONTAINERSHow Azure Container Instances lets you run containers directly on Azure without managing any underlying infrastructure — and how Azure Container Registry stores and distributes private container images with geo-replication and automated build pipelines.
Azure App Service — Managed Web Hosting and Deployment Slots
AZURE-APP-SERVICEHow Azure App Service provides a fully managed platform for hosting web applications, APIs, and mobile backends — covering App Service plan tiers, deployment methods, deployment slots for zero-downtime releases, autoscale, and custom domain and TLS configuration.
Azure Virtual Networks — Subnets, Peering, and Private Connectivity
AZURE-VNETSHow Azure Virtual Networks provide isolated private network space for Azure resources — covering address space planning, subnet design, service endpoints versus private endpoints for PaaS connectivity, and VNet peering for connecting networks across regions.
Azure Network Security — NSGs, ASGs, and Azure Firewall
AZURE-NETWORK-SECURITYHow Azure secures network traffic at the subnet and NIC level with Network Security Groups — and when to graduate to Azure Firewall for centralised stateful inspection, threat intelligence, FQDN filtering, and cross-VNet policy enforcement.
Azure DNS — Public Zones, Private Zones, and Name Resolution
AZURE-DNSHow Azure DNS hosts both public DNS zones delegated from registrars and private DNS zones for internal Azure name resolution — covering record types, alias records for Azure resources, private zone VNet links, and auto-registration of VM names.
Azure Load Balancing — Load Balancer, Application Gateway, Traffic Manager, and Front Door
AZURE-LOAD-BALANCINGHow Azure's four load-balancing services split traffic across backends — from the regional L4 Azure Load Balancer for TCP/UDP workloads, to the L7 Application Gateway for HTTP routing and WAF, to the global Traffic Manager for DNS-based routing, and Azure Front Door for global HTTP acceleration with caching and WAF.
Azure VPN Gateway and ExpressRoute — Hybrid Network Connectivity
AZURE-HYBRID-CONNECTIVITYHow Azure connects on-premises networks to the cloud — through VPN Gateway for encrypted tunnels over the public internet, and ExpressRoute for private dedicated circuits that bypass the internet entirely — and how Virtual WAN simplifies hub-and-spoke connectivity at scale.
Azure Monitor — Metrics, Logs, Alerts, and Workbooks
AZURE-MONITOR-INSIGHTSHow Azure Monitor collects metrics and logs from every Azure resource, routes them to Log Analytics workspaces for KQL querying, and triggers alerts through action groups — providing the observability layer that spans VMs, containers, networks, and applications.
Azure Backup and Site Recovery — Protecting Azure Workloads
AZURE-BACKUPHow Azure Backup protects VMs, databases, files, and on-premises servers through a Recovery Services vault — and how Azure Site Recovery provides business continuity by replicating entire workloads to a secondary region for failover when a primary region fails.
Azure Network Watcher — Network Diagnostics and Monitoring
AZURE-NETWORK-WATCHERHow Azure Network Watcher provides a toolkit of network diagnostic and monitoring capabilities — from testing whether traffic is allowed by NSG rules, to capturing packets on VMs, to analysing NSG flow logs for visibility into all traffic flows across your Azure network.
Azure Application Insights — APM and Application Telemetry
AZURE-APP-INSIGHTSHow Azure Application Insights provides application performance monitoring for live applications — automatically collecting request rates, response times, failure rates, and dependencies, then surfacing them through dashboards, smart detection alerts, distributed traces, and availability tests.
Windows Deployment — Installation Methods and Activation
WINDOWS-DEPLOYMENTHow Windows 10 and 11 get onto devices — covering clean install, in-place upgrade, and wipe-and-load deployment methods, the Windows Assessment and Deployment Kit tools, and the four activation methods that organisations use to license Windows at scale.
Windows Imaging with DISM — WIM, FFU, and Image Servicing
WINDOWS-DISMHow DISM manages Windows images — capturing and applying WIM and FFU format images, servicing images offline to inject drivers, updates, and features, and using Sysprep to generalise a reference installation before deployment to multiple machines.
Windows Local Accounts — UAC, Windows Hello, and Account Policies
WINDOWS-ACCOUNTSHow Windows manages local user accounts and administrator elevation through User Account Control — the account types available, how UAC intercepts privilege escalation requests, and the Windows Hello authentication methods that replace passwords with biometrics and PINs.
Windows Device Join — Workgroup, Domain, Entra ID, and Hybrid
WINDOWS-DEVICE-JOINHow Windows devices connect to identity infrastructure — comparing workgroup, on-premises AD domain join, Entra ID join for cloud-native scenarios, and Hybrid Entra ID join for enterprises that need both on-premises Kerberos and cloud identity in the same device registration.
NTFS and Share Permissions — Controlling File System Access
NTFS-PERMISSIONSHow Windows controls access to files and folders through NTFS permissions applied directly to the file system — covering the six standard permissions, inheritance and propagation, effective permissions calculation, and how NTFS and network share permissions combine when accessing files over the network.
EFS — Encrypting File System for Per-File Data Protection
EFSHow the Encrypting File System provides transparent per-file encryption on NTFS volumes — using public-key certificates to encrypt the file encryption key, enabling individual users to protect sensitive files without full-disk encryption, and how recovery agents and certificate backup ensure data is never permanently lost.
Windows Networking — IPv4, IPv6, and Network Troubleshooting
WINDOWS-NETWORKINGHow Windows configures and troubleshoots network connectivity — covering IPv4 addressing including APIPA fallback, IPv6 address types and transition technologies, network profiles, and the command-line tools used to diagnose connectivity issues from name resolution to packet loss.
Windows Wireless — 802.11 Standards, WPA3, and Wireless Profiles
WINDOWS-WIRELESSHow Windows manages wireless network connections — the 802.11 standards from a to ax and their frequency and throughput characteristics, the WPA2/WPA3 security modes, how wireless profiles are created and prioritised, and the netsh wlan commands used to manage wireless connections from the command line.
Windows Remote Access — RDP, VPN Protocols, and Remote Assistance
WINDOWS-REMOTE-ACCESSHow Windows enables remote access — through Remote Desktop Protocol for full graphical sessions, Quick Assist and Remote Assistance for helpdesk support, and the VPN protocols Windows supports natively for secure tunnelled connectivity back to corporate networks.
Windows Defender Firewall — Profiles, Rules, and Connection Security
WINDOWS-FIREWALLHow Windows Defender Firewall controls inbound and outbound network traffic through a profile-based rule system — applying different rule sets depending on whether the device is on a domain, private, or public network — and how connection security rules use IPsec to authenticate and encrypt traffic between specific endpoints.
Group Policy on Windows Clients — LGPO, Processing Order, and Troubleshooting
WINDOWS-GPO-CLIENTHow Group Policy applies to Windows client devices — the LSDOU processing order that determines which settings win when policies conflict, the Local Group Policy Object for standalone devices, and the command-line tools that reveal exactly which policies applied, from which GPO, and why.
Windows Recovery Environment — WinRE, Reset, and Startup Repair
WINDOWS-RECOVERYHow Windows Recovery Environment provides a rescue toolkit when Windows won't boot — automatic startup repair, system restore, system image recovery, and a command prompt for manual recovery — plus the Reset this PC feature that reinstalls Windows without requiring external media.
Windows Update — Client Servicing, WSUS, and Repair
WINDOWS-UPDATE-CLIENTHow Windows 10 and 11 receive and apply updates — the servicing model separating quality from feature updates, deferral policies for controlling update timing, WSUS for centralised on-premises update management, and DISM plus SFC for repairing a corrupted Windows component store.
Windows Performance and Event Monitoring — Task Manager, Perfmon, and Event Viewer
WINDOWS-PERFORMANCEHow to monitor and diagnose Windows performance issues — using Task Manager's seven tabs for real-time process and resource visibility, Performance Monitor for detailed counter-based analysis with Data Collector Sets, Resource Monitor for per-process network and disk I/O, and Event Viewer for correlating system events with performance degradation.
AppLocker and Application Control — Whitelisting Apps on Windows
WINDOWS-APPLOCKERHow AppLocker enforces application control policies on Windows Enterprise and Education devices — defining which executables, scripts, Windows Installer packages, and packaged apps users are allowed to run — and how the modern Windows Package Manager and MSIX packaging format fit into enterprise app management.
ESXi, vSphere, vCenter, vSAN, NSX-T — VMware's virtualisation platform from bare-metal hypervisors to software-defined networking and storage.
VMware vSphere — ESXi, vCenter, and the Virtualisation Stack
VSPHERE-OVERVIEWWhat VMware vSphere is — the relationship between ESXi hypervisors and vCenter Server, the editions and licensing model, and the key optional components like vSAN and Tanzu that extend the core platform.
vCenter Server — Appliance Deployment, HA, and Enhanced Linked Mode
VCENTER-SERVERHow vCenter Server Appliance works — the Linux-based appliance that replaced Windows vCenter, its deployment sizing options, how vCenter HA provides active/passive redundancy, and how Enhanced Linked Mode links multiple vCenter instances into a single management view.
ESXi Host Architecture — VMkernel, Management Interfaces, and Host Profiles
ESXI-HOSTHow an ESXi host is structured — the VMkernel that abstracts hardware for virtual machines, the management interfaces available at the console and over the network, lockdown modes that restrict access for security, and host profiles that enforce configuration consistency across many hosts.
vSphere Networking — Standard Switches, Distributed Switches, and VMkernel Adapters
VSPHERE-NETWORKINGHow vSphere virtualises network connectivity — comparing vSphere Standard Switches and Distributed Switches, how VMkernel adapters carry management and storage traffic, VLAN tagging modes that connect VMs to physical networks, and NIC teaming policies that distribute load and provide redundancy.
vSphere Storage — Protocols, Datastores, and Storage Policies
VSPHERE-STORAGEHow vSphere connects to and organises storage — the block and file protocols that carry VM disk data, the VMFS and NFS datastore types that hold virtual machine files, raw device mappings for direct SAN access, and Storage Policy-Based Management that abstracts storage capabilities from the VM.
VMware vSAN — Hyper-Converged Storage Architecture
VSANHow VMware vSAN pools local NVMe, SSD, and HDD storage across ESXi hosts into a shared distributed datastore — covering the Original Storage Architecture versus the Express Storage Architecture introduced in vSAN 8, fault domains, storage policies, and stretched cluster design.
vSphere High Availability — Host Failure Detection and VM Restart
VSPHERE-HAHow vSphere HA monitors ESXi hosts and automatically restarts virtual machines on surviving hosts when a failure is detected — covering heartbeat mechanisms, admission control policies that reserve failover capacity, VM restart priority, and VMCP for datastore-level failure handling.
vSphere DRS — Distributed Resource Scheduler and Load Balancing
VSPHERE-DRSHow vSphere Distributed Resource Scheduler continuously monitors CPU and memory utilisation across a cluster and automatically migrates virtual machines via vMotion to balance load — and how DRS rules, automation levels, and DPM extend its behaviour for advanced workload placement and power efficiency.
vMotion and Storage vMotion — Live VM and Disk Migration
VMOTIONHow vSphere migrates running virtual machines between hosts with vMotion and between datastores with Storage vMotion — the network and hardware requirements that must be met, Enhanced vMotion Compatibility that bridges CPU generation gaps, and cross-vCenter migration for moving VMs between vCenter instances.
vSphere Fault Tolerance — Zero-Downtime VM Protection
VSPHERE-FAULT-TOLERANCEHow vSphere Fault Tolerance creates a continuously synchronised shadow VM on a separate host — providing zero RPO and near-zero RTO by instantly taking over if the primary host fails — and the strict requirements and limitations that govern which workloads FT can protect.
vSphere Security — Roles, Permissions, Lockdown, and Certificates
VSPHERE-SECURITYHow vSphere controls access to virtualisation infrastructure — through a role-based permission model that grants privileges on inventory objects, lockdown modes that restrict direct ESXi host access, and certificate management via the VMware Certificate Authority that secures internal component communication.
vSphere VM Encryption, vTPM, and Trust Authority
VSPHERE-VM-ENCRYPTIONHow vSphere protects virtual machine data at rest and in motion through VM Encryption tied to an external Key Management Server, virtual Trusted Platform Module for guest OS security features, and vSphere Trust Authority for attestation-based host trust without requiring all hosts to connect directly to KMS.
vSphere Virtual Machines — Hardware Versions, Disk Types, and Snapshots
VSPHERE-VMSHow vSphere virtual machines are constructed — the hardware version that determines available virtual devices, the machine types and BIOS/UEFI options, the virtual disk formats and their performance implications, the files that make up a VM on disk, and how snapshots work as a chain of delta disks.
vSphere Resource Management — Pools, Shares, Reservations, and Limits
VSPHERE-RESOURCE-MANAGEMENTHow vSphere controls how CPU and memory are allocated among virtual machines — using resource pools to group VMs with shared entitlements, shares to set relative priority during contention, reservations to guarantee minimum resources, and limits to cap maximum consumption.
vSphere Content Library — Templates, OVF Deployment, and Subscriptions
VSPHERE-CONTENT-LIBRARYHow vSphere Content Library provides a centralised repository for VM templates, OVF/OVA packages, ISO images, and scripts — and how subscribed libraries automatically synchronise content from a published library to remote sites, enabling consistent and controlled VM deployment across a datacenter.
vSphere Lifecycle Manager — Patching and Upgrading ESXi Hosts
VSPHERE-LIFECYCLE-MANAGERHow vSphere Lifecycle Manager manages the software lifecycle of ESXi hosts — offering both the legacy baseline-based approach for patching individual updates and the modern image-based approach that treats the entire host software stack as a single versioned image for consistent cluster-wide deployment.
vCenter Backup, Restore, and VCSA HA
VCENTER-BACKUPHow to protect a vCenter Server Appliance from failure — using the built-in file-based backup to export configuration and inventory data to an external server on a schedule, restoring from backup when needed, and deploying vCenter HA for active/passive redundancy without relying on external backup.
vSphere Monitoring — Alarms, Performance Charts, and esxtop
VSPHERE-MONITORINGHow vSphere surfaces health and performance data — predefined alarms that trigger on host and VM conditions with configurable notifications, performance charts that visualise historical CPU, memory, network, and disk metrics, and esxtop for real-time deep-dive diagnostics directly on the ESXi host.
vSphere Replication and Site Recovery Manager — Disaster Recovery
VSPHERE-REPLICATIONHow vSphere Replication asynchronously replicates virtual machine disks to a secondary site at configurable RPOs — and how Site Recovery Manager orchestrates the entire DR process from automated failover and recovery plan execution to non-disruptive testing and failback.
VMware Cloud Foundation and the Aria Suite
VMWARE-CLOUD-FOUNDATIONHow VMware Cloud Foundation bundles ESXi, vCenter, vSAN, and NSX into a single integrated SDDC platform deployed and managed by SDDC Manager — and how the Aria suite of management tools extends VCF with capacity planning, log analytics, network visibility, and cloud automation.
Debian, Ubuntu, RHEL — open-source server administration, filesystems, LVM, Samba, OpenLDAP, and the tools that run most of the internet.
Red Hat Enterprise Linux — Open Source, Distributions, and Subscriptions
RHEL-OVERVIEWWhat Red Hat Enterprise Linux is — how open source licensing works, how Linux distributions differ from the kernel itself, and how RHEL's subscription model provides support, updates, and certifications for enterprise workloads running on the same Fedora/CentOS-derived codebase.
The Linux Command Line — Bash, History, and Keyboard Shortcuts
LINUX-COMMAND-LINEHow to work efficiently at the Linux command line — understanding Bash shell command syntax, navigating and reusing command history, and using keyboard shortcuts that save time when typing long commands, editing mistakes, or searching for previous commands.
Linux File System Hierarchy — Directories, Files, and Links
LINUX-FILESYSTEMHow Linux organises files into a single unified directory tree rooted at / — the purpose of each major directory in the Filesystem Hierarchy Standard, how to navigate and manipulate files from the command line, the difference between hard links and symbolic links, and how glob patterns match multiple files at once.
Linux Text Processing — I/O Redirection, Pipes, Vim, and Shell Variables
LINUX-TEXT-PROCESSINGHow Linux connects programs together and processes text — using I/O redirection to send output to files and capture errors separately, piping the output of one command as input to another, editing files with Vim's modal interface, and controlling shell behaviour through environment variables and startup files.
Linux Users and Groups — Accounts, sudo, and Password Policy
LINUX-USERS-GROUPSHow Linux manages user identities through the /etc/passwd and /etc/shadow databases, the commands for creating and modifying user accounts, how groups enable shared access to resources, and how sudo grants controlled privilege escalation without sharing the root password.
Linux File Permissions — chmod, SUID, SGID, and umask
LINUX-PERMISSIONSHow Linux controls access to files and directories through a nine-bit permission model — reading permission strings from ls -l output, changing permissions with chmod in symbolic or octal notation, setting ownership with chown, applying special bits like SUID and sticky bit, and controlling default permissions with umask.
Linux Process Management — ps, Signals, Job Control, and Load Average
LINUX-PROCESSESHow Linux manages running programs as processes — identifying processes with ps and top, controlling foreground and background jobs within a terminal session, sending signals to communicate with processes including terminating unresponsive ones, and understanding load average as a measure of system demand.
systemd — Service Management, Units, and Targets
LINUX-SYSTEMDHow systemd manages the Linux system from boot to shutdown — organising daemons and resources as units with declarative configuration files, controlling services with systemctl, and using targets as dependency-based milestones that replace traditional SysV runlevels.
Linux — SSH & Secure Remote Access
SSHOpenSSH client and server on RHEL 9 — key-based authentication, sshd_config hardening, ssh-keygen, scp, and sftp.
Linux — Logging & Journal
LOGGINGsystemd-journald and rsyslog on RHEL 9 — journal persistence, journalctl filtering, log facilities, priorities, and /var/log structure.
Linux Network Configuration — ip, nmcli, and Name Resolution
LINUX-NETWORKINGHow to configure and troubleshoot network interfaces on RHEL — inspecting current network state with ip commands, managing connections persistently with NetworkManager and nmcli, setting hostnames, and controlling how the system resolves DNS names.
Linux Archiving and File Transfer — tar, rsync, and sftp
LINUX-ARCHIVINGHow to archive and transfer files on Linux — creating and extracting compressed archives with tar, securely copying files between systems with scp and sftp, and efficiently synchronising directories between hosts with rsync including its important trailing-slash behaviour.
Linux — Package Management with DNF
DNFRPM package management on RHEL 9 — DNF commands, repositories, modules and AppStreams, and subscription-manager basics.
Linux — Storage & Filesystems
STORAGEBlock device management on RHEL 9 — partitioning with fdisk/parted, XFS and ext4 filesystems, mount, /etc/fstab, and LVM basics.
Linux — Cockpit & System Support
COCKPITCockpit web console for RHEL 9 administration — enabling Cockpit, its management features, and Red Hat support tools including sosreport and insights-client.
Google Cloud Platform, Google Workspace — GCP compute, Cloud DNS, Cloud Storage, GKE, and the Google productivity suite for enterprise environments.
GCP — Resource Hierarchy and Organisation
GCP-FOUNDATIONSHow GCP structures organisations, folders, projects, and resources — and how IAM policies inherit down the hierarchy.
GCP — Identity and Access Management
IAMGCP's IAM model — principals, roles, service accounts, org policies, and the principle of least privilege in practice.
GCP — Compute Engine
COMPUTE-ENGINEGCP's IaaS VM service — machine types, images, persistent disks, instance groups, preemptible/spot VMs, and metadata-driven startup scripts.
GCP — Google Kubernetes Engine
GKEManaged Kubernetes on GCP — standard vs Autopilot modes, node pools, workload identity, GKE networking, and cluster maintenance.
GCP — Serverless Compute
SERVERLESSGCP's serverless spectrum — Cloud Run, Cloud Functions, and App Engine — including when to use each and how they handle scale-to-zero.
GCP — Cloud Storage
CLOUD-STORAGEGCS object storage — storage classes, bucket configuration, lifecycle policies, access control, signed URLs, and transfer services.
GCP — Managed SQL Databases
CLOUD-SQLCloud SQL and Cloud Spanner — GCP's relational database offerings, their architectures, replication models, and when to choose each.
GCP — NoSQL and Big Data Databases
NOSQLFirestore, Bigtable, Memorystore, and BigQuery — GCP's NoSQL and analytical database services and their appropriate use cases.
GCP — BigQuery
BIGQUERYGCP's serverless data warehouse — how BigQuery stores and queries petabyte-scale data, its pricing model, and integration with the analytics ecosystem.
GCP — VPC Networking
VPCGCP Virtual Private Cloud — global VPC architecture, subnets, firewall rules, routes, shared VPC, and VPC peering.
GCP — Load Balancing and CDN
LOAD-BALANCINGGCP's load balancing portfolio — global vs regional, HTTP(S), TCP, UDP, and internal load balancers, plus Cloud CDN for caching.
GCP — Hybrid Connectivity
HYBRID-CONNECTIVITYConnecting on-premises to GCP — Cloud VPN, Cloud Interconnect, Cloud Router, and the BGP dynamic routing that ties them together.
GCP — Security and Compliance
SECURITYGCP's security services — KMS, Secret Manager, Security Command Center, VPC Service Controls, DLP, and compliance frameworks.
GCP — Cloud Monitoring and Operations
MONITORINGGoogle Cloud's operations suite — Cloud Monitoring, Cloud Logging, Cloud Trace, Cloud Profiler, and Error Reporting for full observability.
GCP — Data Analytics and Pipelines
DATA-ANALYTICSGCP's data analytics stack — Pub/Sub messaging, Dataflow stream and batch processing, Dataproc for Hadoop/Spark, and the Looker BI platform.
GCP — Migration to GCP
MIGRATIONMigrating workloads to GCP — the migration framework, transfer tools, VM migration with Migrate for Compute Engine, and database migration strategies.
GCP — Reliability and Cost Optimisation
RELIABILITYDesigning reliable GCP architectures — SRE principles, high availability patterns, DR planning, and cost optimisation strategies.
GCP — Anthos and Hybrid Cloud
ANTHOSAnthos — Google's hybrid and multi-cloud platform for running Kubernetes workloads on-premises, in GCP, and across other clouds.
Proxmox VE — the open-source hypervisor combining KVM virtualisation and LXC containers with Ceph storage and high-availability clustering.
Proxmox VE — Overview and Architecture
PROXMOX-VEWhat Proxmox VE is — Type 1 hypervisor combining KVM and LXC on Debian Linux, its feature set, subscription tiers, and where it fits in the virtualisation landscape.
Proxmox VE — Installation and Initial Configuration
INSTALLATIONInstalling Proxmox VE — ISO installation, ZFS RAID options, post-install steps, repository configuration, and subscription management.
Proxmox VE — Clustering with Corosync
CLUSTERINGBuilding a Proxmox cluster — Corosync quorum, pmxcfs, joining nodes, cluster network requirements, and managing cluster membership.
Proxmox VE — Networking
NETWORKINGProxmox network configuration — Linux bridges, bonding (LACP), VLANs, Open vSwitch, and the /etc/network/interfaces file.
Proxmox VE — Built-in Firewall
FIREWALLProxmox's iptables-based firewall — three-tier configuration (Datacenter, host, VM/CT), security groups, rule syntax, and enabling per-interface.
Proxmox VE — Storage Backends
STORAGEProxmox storage plugins — directory, LVM, LVM-Thin, NFS, iSCSI, and how to add and configure shared storage for VM disks and backups.
Proxmox VE — ZFS Storage
ZFSZFS on Proxmox — pool types, datasets and zvols, snapshots, send/receive replication, ARC caching, and integrating ZFS as a Proxmox storage backend.
Proxmox VE — Ceph Distributed Storage
CEPHCeph on Proxmox — deploying a hyper-converged Ceph cluster, OSDs, monitors, pools, and using Ceph RBD for VM storage.
Proxmox VE — KVM Virtual Machines
KVMCreating and managing KVM VMs in Proxmox — VM hardware configuration, disk options, CPU and memory settings, VirtIO drivers, and QEMU guest agent.
Proxmox VE — LXC Containers
LXCLinux containers in Proxmox — container templates, creation, unprivileged vs privileged, resource limits, bind mounts, and containers vs KVM VMs.
Proxmox VE — High Availability
HIGH-AVAILABILITYProxmox HA Manager — how it detects node failures, fencing mechanisms, HA groups, resource states, and the quorum requirement.
Proxmox VE — Backup and Restore
BACKUPProxmox backup with vzdump — snapshot/suspend/stop modes, backup schedules, Proxmox Backup Server, and restoring VMs and containers.
Proxmox VE — VM Advanced Features
VM-ADVANCEDAdvanced Proxmox VM features — cloud-init integration, PCIe passthrough, CPU pinning, NUMA, live migration, and VM snapshots.
Proxmox VE — Monitoring and Maintenance
MONITORINGMonitoring Proxmox — built-in node/VM metrics, RRD graphs, external monitoring with InfluxDB and Grafana, log management, and routine maintenance tasks.
Proxmox VE — Templates and Snapshots
TEMPLATESProxmox VM and container templates — converting VMs to templates, linked clones vs full clones, cloud-init for rapid provisioning, and snapshot workflows.
Cisco IOS, FTD, FMC, and the Firepower platform — from switch and router configuration to next-generation firewall policies, AnyConnect VPN, SD-Access, and network automation.
Cisco IOS — CLI and Device Fundamentals
IOS-CLINavigating the Cisco IOS command-line interface — exec modes, configuration hierarchy, help system, show commands, and saving configuration.
Cisco IOS — Switch Configuration
SWITCHINGConfiguring Cisco IOS switches — VLANs, access and trunk ports, DTP, inter-VLAN routing concepts, and verifying the MAC address table.
Cisco IOS — STP, RSTP, and EtherChannel
STPSpanning Tree configuration on Cisco IOS — root bridge election, PortFast, BPDU Guard, and bundling links with EtherChannel using LACP and PAgP.
Cisco IOS — Router Configuration
ROUTINGConfiguring Cisco IOS routers — interface IP addressing, static routes, floating static routes, default routes, and verifying IPv4 routing.
Cisco IOS — Inter-VLAN Routing
INTER-VLANRouting between VLANs on Cisco IOS — Router-on-a-Stick subinterfaces, Layer 3 switch SVIs, and routed ports.
Cisco IOS — OSPF Configuration
OSPFConfiguring OSPFv2 on Cisco IOS — router ospf, network statements, passive interfaces, neighbour verification, cost tuning, and multi-area OSPF.
Cisco IOS — IPv6 Configuration
IPV6Configuring IPv6 on Cisco IOS routers and switches — interface addressing, EUI-64, static routes, OSPFv3, and dual-stack operation.
Cisco IOS — Access Control Lists
ACLConfiguring standard and extended ACLs on Cisco IOS — numbered and named syntax, wildcard masks, interface application, VTY restriction, and troubleshooting.
Cisco IOS — Switch Security Features
SWITCH-SECURITYLayer 2 security on Cisco IOS switches — port security, DHCP snooping, Dynamic ARP Inspection, and 802.1X port authentication.
Cisco IOS — First Hop Redundancy
FHRPConfiguring HSRP, VRRP, and GLBP on Cisco IOS — virtual IP setup, priority and preemption, interface tracking, and verifying gateway redundancy.
Cisco Wireless — WLC and Lightweight APs
WIRELESSCisco wireless LAN architecture — WLC interfaces and WLANs, CAPWAP AP join process, FlexConnect, AP modes, and basic WLC configuration.
Cisco IOS — Quality of Service
QOSImplementing QoS on Cisco IOS using MQC — class-maps, policy-maps, DSCP marking, LLQ for voice, and applying service policies to interfaces.
Cisco Smart Licensing
LICENSINGHow Cisco Smart Licensing works — CSSM, virtual accounts, token-based registration, compliance reporting, and Smart Licensing Using Policy (SLP).
Cisco FTD and FMC — Platform Overview
FTD-FMCCisco Firepower Threat Defense (FTD) and Firepower Management Center (FMC) — architecture, platform options, management modes, and how FTD differs from ASA.
Cisco Firepower — Policy Architecture
FIREPOWER-POLICIESCisco Firepower's layered policy model — Access Control Policy, IPS, malware and file inspection, SSL decryption, identity, and DNS policies — and how they stack.
Cisco FTD — VPN Configuration
VPNSite-to-site and remote access VPN on Cisco FTD — IKEv2 IPsec tunnels configured via FMC, AnyConnect RA-VPN with RADIUS authentication, and NAT exemption.
Cisco SD-Access and DNA Center
SD-ACCESSCisco Software-Defined Access — DNA Center as the controller, the SD-Access fabric (underlay, overlay, LISP, VXLAN), and Scalable Group Tags for policy.
Cisco Network Automation
AUTOMATIONAutomating Cisco networks — NETCONF/YANG, REST APIs (DNA Center, Meraki), Ansible for IOS configuration, and Terraform for infrastructure provisioning.
EC2, S3, VPC, IAM, RDS, Lambda, ECS, CloudFront, and the full AWS platform — compute, storage, databases, networking, security, and serverless from the world's largest cloud provider.
AWS Global Infrastructure — Regions, AZs, and Edge
AWS-GLOBAL-INFRASTRUCTUREHow AWS organises its worldwide infrastructure into regions, availability zones, edge locations, and extension zones.
AWS IAM — Identity and Access Management
AWS-IAMUsers, groups, roles, and policies — how AWS controls who can do what to which resources.
AWS Shared Responsibility Model
AWS-SHARED-RESPONSIBILITYThe dividing line between what AWS secures and what you secure — and how that line shifts by service type.
AWS Well-Architected Framework — The 6 Pillars
AWS-WELL-ARCHITECTEDThe six pillars AWS uses to evaluate cloud architectures: operational excellence, security, reliability, performance efficiency, cost optimization, and sustainability.
Amazon EC2 — Elastic Compute Cloud
AWS-EC2Virtual servers on demand — instance types, AMIs, purchasing options, and how EC2 fits into a broader architecture.
AWS Auto Scaling & Elastic Load Balancing
AWS-AUTO-SCALING-ELBHow AWS scales compute horizontally and distributes traffic — Launch Templates, Auto Scaling Groups, ALB/NLB/GWLB, and the patterns that make stateless architectures resilient.
AWS Lambda & Serverless Architecture
AWS-LAMBDA-SERVERLESSEvent-driven compute without servers — how Lambda executes code, manages concurrency, integrates with the AWS ecosystem, and how serverless patterns compare to container-based approaches.
Containers on AWS — ECS, EKS, and Fargate
AWS-CONTAINERSHow AWS runs containerised workloads — from managed Kubernetes to serverless Fargate and the ECS task model.
Amazon S3 — Object Storage
AWS-S3How S3 stores unlimited objects across storage classes, handles versioning and replication, and secures data at rest.
AWS Block, File, and Hybrid Storage
AWS-STORAGE-HYBRIDEBS, EFS, FSx, Storage Gateway, and Snow Family — how AWS handles block, file, and hybrid on-premises storage scenarios.
Amazon RDS & Aurora
AWS-RDS-AURORAManaged relational databases on AWS — how RDS abstracts operational overhead, what Aurora's distributed storage engine provides, and when to use each.
Amazon DynamoDB
AWS-DYNAMODBAWS's serverless NoSQL key-value and document database — data model, partitioning, consistency options, indexing, and the operational patterns that make DynamoDB scale to any throughput.
AWS Specialized Database Services
AWS-OTHER-DATABASESPurpose-built databases beyond RDS and DynamoDB — ElastiCache for caching, Redshift for analytics, Neptune for graphs, DocumentDB for documents, and the rest of the AWS database portfolio.
AWS Messaging & Event-Driven Architecture
AWS-MESSAGINGDecoupled, asynchronous communication between services — SQS queues, SNS fan-out, Kinesis streaming, EventBridge routing, and how these primitives compose into event-driven architectures.
Amazon VPC — Virtual Private Cloud
AWS-VPCHow AWS isolates your network with VPCs, subnets, security groups, NACLs, and endpoints for private connectivity.
AWS Hybrid Networking
AWS-HYBRID-NETWORKINGConnecting on-premises infrastructure to AWS — Site-to-Site VPN, Direct Connect, Transit Gateway for multi-VPC and multi-account routing, and PrivateLink for service exposure.
Amazon CloudFront & Route 53
AWS-CDN-DNSContent delivery and DNS on AWS — CloudFront's global edge network, cache behavior configuration, Route 53 routing policies, and how they combine to deliver low-latency, resilient applications worldwide.
AWS Security Services
AWS-SECURITY-SERVICESThreat detection, data protection, and infrastructure security on AWS — Shield, WAF, GuardDuty, Inspector, Macie, KMS, CloudHSM, Secrets Manager, and Security Hub.
AWS Governance & Observability
AWS-GOVERNANCEManaging AWS at scale — Organizations, Control Tower, Service Control Policies, CloudTrail audit logging, AWS Config compliance, and CloudWatch observability.
AWS Cost Management & Optimization
AWS-COST-MANAGEMENTUnderstanding and controlling AWS spending — how AWS pricing works, purchasing model trade-offs, visibility tools, and the architectural patterns that reduce waste.
No articles match your search.