avatar

A place where I share my thoughts, findings and learnings

  • HOME
  • CATEGORIES
  • TAGS
  • ARCHIVES
  • ABOUT
Home

Strategies for Multi-Cloud Infrastructure

What is multi cloud? Research shows that nearly 90% of companies use multi-cloud environments. Only a small percentage of organizations still rely solely on their on-premises infrastructure. Mo...

Jun 10, 2025

Self Hosted Asset Management Solution

Lets first define the assets Hardware: Laptops, desktops, smartphones, tablets, and other physical devices. Software: On-premises applications, cloud-based apps, and software licenses. Net...

May 20, 2025

Challenges in Mobile Device Management

Workforce IT requirements Mobile device management is any software that allows IT Managers to register and securely enforce administrative policies on laptops, smartphones, tablets, or similar IT ...

Apr 28, 2025

Exploring ADCS - A Double-Edged Sword

Focuss on the less obvious risks Cyber security threat landscape is constantly evolving, making it hard to stay ahead of potential threats. While most of the publicly documented vulnerabilities a...

Nov 27, 2024

Integrating on-prem AD with Entra ID

In today’s tech-driven workplaces, managing user identities across various platforms can be challenging. Connecting your local Active Directory to Microsoft Entra ID (formerly Azure AD) simplifies ...

Nov 13, 2024 Active Directory

Configure ADMX Group Policy templates

Difference between Computer and User Administrative Templates When you’re setting up Group Policies, you’ll notice two main sections: Computer Configuration and User Configuration. These correspon...

Sep 15, 2024 Active Directory

Active Directory Services Installation LAB

Pre-requisites for Installation: Before starting, make sure your server meets the following requirements: Processor: Minimum 2 cores, with 1 extra core for every 1,000 concurrent users. Memo...

Sep 14, 2024 Active Directory

Proxmox Provisioning VMs using Terraform

What is Terraform? Terraform, created by HashiCorp, is an Infrastructure as Code (IaC) tool that lets you manage and set up your infrastructure using code. In the past, setting up or configuring i...

Jun 25, 2024 Virtualization

Cloud-init templates in Proxmox Cluster

What is Cloud-init Drive? In Proxmox, the “cloud-init drive” is a virtual disk that you attach to a virtual machine or container. This virtual disk tells the machine how to set itself up when it i...

Jun 15, 2024 Virtualization

Proxmox VE Server Installation

What is Proxmox? Proxmox Virtual Environment (Proxmox VE) is a free and open-source platform for managing server virtualization. It provides an easy-to-use web interface for handling virtual mac...

Jun 10, 2024 Virtualization

Active Directory MECM LAB - Part 2

On the previous post (SCCM LAB part 1) we setup an environment to test SCCM vulnerabilities. Recon Recon without user scan with nmap (full port list used here : https://learn.microsoft.com...

Mar 28, 2024 Active Directory

Active Directory MECM LAB - Part 1

After few hours, days, weeks of install, ansible recipe creation, fails and many retries, the lab is ready. This lab was created with the inspiration to test the following resources: Github : ...

Mar 23, 2024 Active Directory

Significance of Virtual Private Cloud

Key Terminology VPC, ECS, ECR, EC2 Subnets and CIDR Range NACL and Security Groups NAT and Internet Gateways Virtual Private Cloud VPC is the most important concept in the cloud securi...

Nov 5, 2023 AWS

Significance of Resource Tags

Resources Tags We can assign metadata to AWS resources in the form of tags. Each tag is a simple label consisting of a customer-defined key and an optional value that can make it easier to manage,...

Oct 4, 2023 AWS

AWS Elastic Compute Cloud (EC2)

It is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make enterprise-scale cloud computing easier for developers. Amazon EC2’s simple web service in...

Apr 8, 2023 AWS

AWS Identity and Access Management

A cloud service that helps us securely control access to AWS resources. IAM controls who is authenticated (signed in) and authorized (has permissions) to use resources. IAM allows us to manage user...

Apr 6, 2023 AWS

Understanding Secure boot on Mobile devices

What is secure boot and how does it work? Secure boot provides a foundation for the security architecture of the device. It is defined as a boot sequence in which each software image that is load...

Feb 10, 2023 android security

OpenSSL Fundamentals, Encryption Notes

OpenSSL OpenSSL is a software library for applications that secure communications over computer networks. Is a C library that implements the main cryptographic operations like symmetric encryption,...

Oct 1, 2022 Cryptography

Understanding VLAN tags and Trunks Ports

What is a VLAN? Imagine you’re at a huge party. There are different groups of people chatting, but they’re not all in one big noisy crowd. Instead, they’re grouped into smaller circles—friends, fa...

Sep 18, 2022 Networking

Recently Updated

  • Strategies for Multi-Cloud Infrastructure
  • Self Hosted Asset Management Solution
  • Challenges in Mobile Device Management
  • Exploring ADCS - A Double-Edged Sword
  • Integrating on-prem AD with Entra ID

Trending Tags

Blogging proxmox AD ConfigMgr Hacking PXE SCCM terraform Access Management AD DS

© 2025 Vishal. Some rights reserved.

Using the Chirpy theme for Jekyll.

Trending Tags

Blogging proxmox AD ConfigMgr Hacking PXE SCCM terraform Access Management AD DS