Techbast

Technical knowledge sharing

  • Firewall
  • Storage
  • Switch/Router
  • Wireless
  • Security
  • Tools
  • Visio Stencils
  • Brand
    • Azure
    • Citrix
    • Netgear
    • Sophos

Others

Sophos Endpoint Instructions For Using Exclusion To Enable Script Removals

April 18, 2023 Tri Nguyen 0

1 Overview Sophos Endpoint blocks malicious software as well as dangerous scripts from running on the system. However, there are scripts we create for our Read More

Acronis Cyber Protect 15: How to configure Replication Virtual Machine feature.

April 13, 2023 john 0

1.Overview Replication VM is the process of creating an exact copy (replica) of a virtual machine and then maintaining the copy in sync with the Read More

Acronis Cyber Protect: How to configure Backup and Recover for Ubuntu Server.

April 12, 2023 john 0

1.Overview Acronis Cyber Protect provides a comprehensive backup solution that protects data on 21 different platforms, including with the Cloud and mobile devices. Integrating advanced Read More

qnap1

QNAP Create User and Group

April 12, 2023 Tri Nguyen 0

1 Creating a new user At the main interface, go to Control Panel Select Users item. User management interface appears. We press Create Select Create Read More

qnap1

QNAP Creating A Shared Folder And Config Permission For Group User

April 12, 2023 Tri Nguyen 0

1 Create a shared folder We go to File Station The folder management interface appears. We select the New folder item as follows. Select Shared Read More

Acronis Cyber Protect: How to configure Backup Plan with File Filter Backup Option.

April 12, 2023 john 0

1.Overview By using File Filters, you can include only specific files and folders to be backed up, or exclude specific files and folders from backup Read More

Harmony endpoint

Harmony Endpoint How To Use Token Limited Installation

April 12, 2023 Tri Nguyen 0

1 Overview The Token Limited Installation feature is to prevent unauthorized installation of the installer from the Endpoint Portal. Help restrict strange devices that are Read More

Harmony endpoint

Harmony Endpoint Push Operations

April 12, 2023 Tri Nguyen 0

1 Overview “Push Operations” are operations that the Endpoint Security Management Server pushes directly to client computers.  To add Push Operation, we access the Push Read More

Harmony endpoint

Harmony Endpoint Full Disk Encryption

April 12, 2023 Tri Nguyen 0

1 Overview Full Disk Encryption provide the capability to protect your data at highest level. It consists of protecting boot options and protecting your data, Read More

Harmony endpoint

Harmony Endpoint Threat Hunting Portal

April 12, 2023 Tri Nguyen 0

1 Overview Threat Hunting is an investigative tool which collects attack information on the organization’s endpoints. All events are collected through multiple sensors on the Read More

Posts pagination

1 2 … 11 »

Copyright © 2025 | WordPress Theme by MH Themes