How-To

  • Yellow Wire Fence Graphic

    Remote Work: Providing Access to Internal Web Content via Amazon WorkLink, Part 2

    After using step-by-step instructions and screenshots to detail how to create a WorkLink fleet amid the COVID-19 remote work surge, Brien Posey wraps up the discussion by showing you the remainder of the configuration process.

  • Remote Work: Providing Access to Internal Web Content via Amazon WorkLink

    Amid the COVID-19 remote work surge, Amazon WorkLink can provide a better alternative to VPNs for enabling remote workers to access internal web content. Brien Posey explains how with illustrated, step-by-step instructions.

  • Azure Arc for a Hybrid World

    Paul Schnackenburg looks at the current capabilities of the public preview of Azure Arc -- extending Azure Resource Manager capabilities to Linux and Windows servers, as well as Kubernetes clusters on any infrastructure across on-premises, multicloud, and edge -- and why you should care.

  • SD-WAN Primer Part 3: Deployment Methods

    Tom Fenton concludes his three-part series on SD-WAN by outlining some different deployment modes.

  • SD-WAN Primer Part 2: How It Works

    After explaining why organizations are choosing SD-WAN over MPLS in part one of this series, Tom Fenton now takes a look at the components underlying the technology approach and how they work.

  • SD-WAN Primer Part 1: The Why

    Tom Fenton begins a three-part primer on the technology that is revolutionizing enterprise networking, explaining the last-gen way and the new way, marked by benefits such as lower costs and better flexibility and manageability.

  • Strategies for Preventing EC2 Security Group Sprawl

    Brien Posey shares best practices for keeping a handle on EC2 security groups -- essentially software firewalls -- to avoid confusion about which ones are actually needed.

  • What's Coming in VMware Horizon 8

    Tom Fenton gets a peek at what's coming in the commercial desktop and app virtualization product and offers his opinions on the best new features, including broader Instant Clone support and more.

  • Eliminating Bad Passwords

    Paul Schnackenburg looks at the issue with passwords and different attacks, modern approaches to password policies and management and how you can improve your (Office 365) organization's security posture with just a few clicks by banning bad passwords.

  • Red Fog Stage

    How Are Public IP Addresses Assigned to EC2 Instances?

    Brien Posey cuts through the confusion associated with allocating IP addresses to EC2 instances on the Amazon cloud, which is done automatically though users can also associate elastic IP addresses with instances.

  • Using Windows 10 Task Scheduler with PowerShell Scripts

    Tom Fenton details step-by-step directions to configure Windows 10 to allow running Task Scheduler and how to set up an automated task to run a PowerShell script every four hours.

  • Performing Weighted Routing in AWS Route 53

    Although Amazon's AWS Route 53 can be used to enable run-of-the-mill, static DNS routing, it can also be used to bring some intelligence to the routing process. For example, Route 53 makes it easy to perform weighted routing, useful in situations where you need to distribute traffic unevenly.

  • Best Practices for Managing Your EC2 Snapshots on AWS Cloud

    Aside from third-party solutions, snapshots are the best option for backing up your EC2 virtual machines, says Brien Posey, who explains how managing the process is something of an art form.

  • Bash to PowerShell Cheat Sheet

    While Tom was learning PowerShell, he found himself trying to translate the bash commands he was familiar with into the PowerShell commands that accomplish the same task, coming up with this handy cheat sheet.

  • How to Migrate DNS Services from GoDaddy to AWS Route 53

    If you host a lot of services on AWS, it can sometimes be useful to let Amazon's Route 53 handle your DNS hosting rather than letting a domain registry service handle it, because sometimes it's just nice to be able to manage your DNS record from within the same environment that you use to manage your other AWS resources.

  • Creating an iSCSI Target on FreeNAS

    Tom follows up on his previous article about installing FreeNAS and using it to create an NFS share to back a VM, now creating an iSCSI target on FreeNAS and using that target as backing for a vSphere VM.

  • Microsoft Cloud App Security: Everything You Need to Know

    The days of relying solely on a "blinky light firewall" to give you a sense of security are gone, and you need a cloud-based security solution for controlling your users' cloud access, such as Microsoft Cloud App Security. Paul Schnackenburg details what MCAS can do for your business, how it integrates with other security technologies and the different flavors it's available in.

  • Green Motherboard

    Installing FreeNAS on a vSphere VM to Provide NFS Storage

    FreeNAS is one one of the most popular software-defined storage products available and in this article Tom Fenton shows you how he installed it on a virtual machine to provide an NFS Share.

  • Managing Software Licenses with AWS License Manager

    With licensing requirements becoming more complex than ever before, it has become increasingly important to use automated tools such as AWS License Manager to track license usage. Brien Posey shows you how.

  • Tracking AWS Activities with CloudTrail, Part 2

    Following up on a previous post that explained that Amazon logs AWS administrative activities and exposes those activities through CloudTrail, Brien Posey now examines two additional features that are worth looking at: Insights and Trails.

  • Passthrough an iGPU to a Virtual Machine

    Tom walks through his experience trying to get a virtual machine to be able to use an integrated GPU, and then do the same thing with a Horizon desktop.

  • Tracking AWS Activities with CloudTrail, Part 1

    While you can enable logging through EC2 instance guest OSes and through various other tools and applications running in the AWS cloud, you can also enable centralized logging through CloudTrail, which is designed to show you the administrative actions that have been performed across the various AWS services.

  • Build 2020: Azure News

    Paul Schnackenburg looks at some of the highlights in the Azure space, and how you can apply some of these new technologies and improvements to your cloud deployments.

  • Creating Immutable Storage on AWS S3, Part 2

    After previously explaining how to create immutable storage within Amazon S3, Brien Posey details some additional capabilities such as automated data lifecycle management or the ability to place a legal hold on certain data.

  • Creating Immutable Storage on AWS S3, Part 1

    Brien Posey demonstrates Object Lock and other functionality for immutable storage on the AWS cloud, often used for compliance mandates and increasingly in conjunction with backup and recovery solutions since some types of ransomware are now designed to target backups.