Techbast

Technical knowledge sharing

  • Firewall
  • Storage
  • Switch/Router
  • Wireless
  • Security
  • Tools
  • Visio Stencils
  • Brand
    • Azure
    • Citrix
    • Netgear
    • Sophos

Articles by john

Wifi Cambium: How to configure Guest Access using cnMaestro on cnPilot E600.

March 26, 2021 john 0

Overview The Guest Access feature creates a separate network for guests by providing internet access to guest wireless devices (mobiles, laptops, etc). This feature allows Read More

Wifi Cambium: How to configure DHCP Pool on cnPilot E600.

March 25, 2021 john 0

Overview cnPilot E600 stay on top of the latest standards with the high-powered, Gigabit speed, beamforming, Multi-user MIMO (MU-MIMO) 802.11ac wave 2 e600 access point Read More

Sophos MTR: Four step to deployment Sophos MTR.

February 23, 2021 john 0

Overview Sophos MTR (Managed Threat Response) is a fully-managed threat hunting, detection and response service that fuses machine learning with human analysis for an evolved Read More

Sophos Home Premium: How to allow blocked applications to run.

January 22, 2021 john 0

Overview Sophos Home allows users exclusions files, folders, websites or applications will not be checked for threats by the antivirus scanner. These exclusions can used Read More

Wifi Cambium: How to configure Cambium CnPilot E600 on cnMaestro.

January 13, 2021 john 0

Overview cnPilot E600 stay on top of the latest standards with the high-powered, Gigabit speed, beamforming, Multi-user MIMO (MU-MIMO) 802.11ac wave 2 e600 access point Read More

WiFi Cambium: Intructions to create a cnMaestro account.

January 11, 2021 john 0

Overview cnMaestro is a cloud-based or on-premises software platform for secure, end-to-end network control. The program’s wireless network manager simplifies device management by offering full Read More

EDR: Instructions Device Isolation on Sophos Central.

January 6, 2021 john 0

Overview Isolation is a very necessary feature to isolate a device from the network to avoid the spread of viruses or to investigate cases that Read More

EDR: How to configure Allow Application.

December 23, 2020 john 0

Overview Software detects threats that are previously unknown. However, it may sometimes identify an application as a threat, even though you know that it’s safe. Read More

Acronis Cyber Protect: How to configure restore Server to Hyper-V.

December 17, 2020 john 0

Overview Hyper-V is a Microsoft technology that allows users to create virtual computer environments, and run and manage multiple operating systems on a single physical Read More

Sangfor HCI: How to install aCloud (HCI) Firmware on Server using USB Boot.

December 10, 2020 john 0

Overview HCI is Sangfor’s virtualization technology, providing super convergence infrastructure, integrating computing, storage, networking, and security resources into a single system. If the traditional Data Read More

Posts navigation

1 2 »

Popular Posts

  • Pfsense: How to install Firewall Pfsense Virtual on VMW...
  • Visio Stencils: Network Diagram with Firewall, IPS, Em...
  • Visio Stencils: Network Diagram that runs Cluster has F...
  • Visio Stencils: Basic network diagram
  • Visio Stencils: Basic network diagram with HP Server
  • Visio Stencils for XG Firewalls and Modules update 01-2...
  • Visio Stencils: Network Diagram with Cisco devices
  • How to configure an IPsec VPN failover with multiple co...

Copyright © 2021 | WordPress Theme by MH Themes