Recent Blogs

Generate a Certificate Signing Request (CSR)
Generate the request using the Certificates snap-in in Microsoft Management Console (MMC).
Step 1: Open the Certificates Snap-In
Press Wi...
Oct 09, 202589Views
1like
0Comments
Hello Folks,
As IT pros, we’re always looking for ways to reduce complexity and improve security in our infrastructure. One area that’s often overlooked is how our services authenticate with each o...
Oct 08, 2025115Views
0likes
0Comments
3 MIN READ
In this post learn how to deploy a standalone root Certificate Authority (CA) on a Windows Server 2025 machine that is not joined to Active Directory. Also learn how to configure the web enrollment i...
Oct 07, 2025236Views
0likes
0Comments
Foundry Local is an on-device AI inference solution offering performance, privacy, customization, and cost advantages. It integrates seamlessly into your existing workflows and applications through a...
Sep 29, 2025403Views
1like
3Comments
Hello folks,
If you run firewalls, routers, or SD‑WAN NVAs in Azure and your pain is connection scale rather than raw Mbps, there is a feature you should look at: Accelerated Connections. It shifts...
Sep 25, 2025136Views
0likes
0Comments
This post distills that 10‑minute drill into a step‑by‑step, battle‑tested playbook you can run in your own environment, complete with the “gotchas” that trip folks up, why they happen, ...
Sep 24, 2025329Views
0likes
0Comments
4 MIN READ
If you’re responsible for securing, scaling, and optimizing cloud infrastructure, this update is for you. Based on my recent conversation with Vyshnavi Namani, Product Manager on the Azure Networking...
Sep 22, 2025246Views
1like
0Comments
20 MIN READ
Implementing certificate-based authentication for Windows Admin Center (WAC) involves leveraging smart card login (user certificates) in Active Directory. In a production Active Directory environment...
Sep 22, 2025460Views
1like
1Comment
Nested virtualization allows you to run Hyper-V inside a VM, opening up incredible flexibility for testing complex infrastructure setups, demos, or learning environments, all without extra hardware. ...
Sep 15, 2025300Views
1like
0Comments
To set up a shielded virtual machine template on a Hyper-V guarded fabric, you need to prepare a secure environment (Host Guardian Service, guarded hosts) and then create a BitLocker-protected, signe...
Sep 02, 2025294Views
0likes
0Comments
Resources
Tags
- azure572 Topics
- Windows Server248 Topics
- powershell136 Topics
- Pierre Roman101 Topics
- Thomas Maurer89 Topics
- security88 Topics
- AzUpdate79 Topics
- anthony bartolo64 Topics
- Sarah Lean64 Topics
- Sonia Cuff64 Topics