Free Webinar
October 3 | 11am PT / 2pm ET
Disaster Recovery 101
Hyper-V and vSphere
Speaker: Oleg Pankevych, Solutions Engineer, StarWind
Posted by Benoit Voirin on October 22, 2019
Hardening Linux: Essential Steps for Boosting Linux Server Cybersecurity

We often tend to believe that operating systems are secured by default, but securing your Linux servers to protect your data, intellectual property and time is the responsibility of the system administrator.

In this post we will review some of the basics operations that shall always be done while installing a new Linux server. We will use Debian as an example for the different commands but finding the rights commands for RedHat, CentOs or any other Linux distribution should be quite straight forward once you know what you are looking for and what you’d like to achieve.

Learn More

Posted by Alex Samoylenko on October 17, 2019
Infrastructure Hybridity and migration to cloud with VMware HCX Enterprise: How does it work?

Virtualization was always about making the most out of less. But corporations fighting over customers divided them into incompatible camps. Recently, though, the winds in the industry have changed. VMware just launched an application mobility platform that migrates and re-balances on-premises vSphere and non-vSphere (Hyper-V and KVM) infrastructures to public clouds based on VMware vCloud!

Learn More

Posted by Vladan Seget on October 15, 2019
Top 5 New Features in Windows Server 2019

Perfection knows no limits and so does Windows Server. Microsoft is on a crusade of ever-perfecting it, and the new version has something to say, indeed. It seems like the company might be coming after virtualization vendors. Why? Well, some of the new features include storage migration, Windows Subsystem for Linux 2, and ReFS deduplication… Just saying…

Learn More

Posted by Romain Serre on October 10, 2019
Migrate resource groups to a new subscription

At the beginning of the week, a customer asks me how he can migrate resource group from one subscription to another. He had a CSP contract and he needed to deploy “Bring-your-own-Licenses” products that were not available in CSP. So, he subscribed to an EA contract. Then he wanted to move resources from CSP to EA. However, he had a lot of dependent resources inside several resource groups. This topic shows you how to make this migration.

Learn More

Posted by Nicolas Prigent on October 8, 2019
Automating Disk Snapshots using Azure Runbook

Even if you know all the backup ways and methods, you can always open a door to new knowledge. This time we’re talking about backing up Azure Virtual Machines (VMs), namely creating VM disk snapshots in order to back up a disk manually. But even in this process, you can get automation. How?

Learn More

Posted by Florent Appointaire on October 3, 2019
[Azure] Document your environment with Cloudockit

Seeing the full picture of how well your Azure is faring can be complicated. It can be quite problematic to consolidate its workloads visually into comprehensive documentation. Subsequently, the reports to customers on the cloud’s effectiveness can come out as too cumbersome. It can also be hard for your team and partners to assess its input into your business’ IT environment overall.

Learn More

Posted by Romain Serre on October 1, 2019
Centralize Microsoft Azure activity logs in log analytics

Tracing your Azure’s health can be quite a challenge. Tons of daily entries delete, update, or create resources in the cloud, and some of these changes may result in a crash. For administrators, identifying which entry caused the error amidst the usual chaotic activity logs can be a problem, which may lead to severe downtime. Luckily, Log Analytics can help you solve such issues in no time.

Learn More

Posted by Florent Appointaire on September 26, 2019
[Azure] Deploy an Application Gateway to protect your Web Apps

In times when computing technology is moving by leaps and bounds, cloud migration happens quite often. While completely common, this process carries some dangers, such as web applications safety. It becomes an issue since you expose your sites publicly. However, if you move your servers to Azure, this won’t be a problem!

Learn More

Posted by Benoit Voirin on September 24, 2019
Cyber Security – Where to start – part 1

Nowadays it’s quite trendy to have penetration testing as a starting point for cybersecurity. Even though penetration testing is a good practice, it’s very limited and focused on one application/product and should therefore not be used as an entry point for cybersecurity.

Learn More

Posted by Florent Appointaire on September 19, 2019
ERROR_Access_Denied after joigning a VM to a domain

Everybody knows that access errors are the most irritating ones in any computer-related activity. They become even more confusing if the traditional means to get behind it won’t work. Say, you are trying to connect your VM to a domain, and you get this infamous “access denied” message? Don’t worry that this will bother you.

Learn More