News

This topic aims to explain the Quorum configuration in a Failover Clustering. As part of my job, I work with Hyper-V Clusters where the Quorum is not well configured and so my customers have not the ...
Last week, Microsoft announced the final release of Windows Server 2016 (the bits can be downloaded here). In addition, Microsoft has announced that Windows Server 2016 supports now a 2-node ...
These CA management accounts are important to increase the security level of your PKI. PKI is a security component and should be managed by security officers. But it is not always the same security ...
These days I’m trying in depth Windows Server 2019. Today I chose to pay attention to Remote Desktop Services. The goal of my lab is to deploy a RDS Farm with all components and with the new HTML5 ...
This week I deployed a Nutanix cluster based on VMware ESXi 6.5u1. I wanted to share with you how to re-image the Nutanix nodes to VMware ESXi. Usually Nutanix blocks are shipped with nodes imaged on ...
In a previous topic, I have described how to deploy a VMware vSAN cluster. VMware vSAN enables to create a hyperconverged cluster in the vSphere environment. The last time we saw how to deploy this ...
AI-powered audio editors are specialized tools used by content creators, sound engineers, and music producers to enhance various aspects of the creative process. These tools help with melody creation, ...
In environment with virtualization infrastructure connected to a SAN, you may want to connect your Veeam proxies (usually a physical servers) to the SAN to collect data. This configuration avoids ...
In a Storage Spaces Direct cluster, the network is the most important part. If the network is not well designed or implemented, you can expect poor performance and high latency. All Software-Defined ...
In this part I’m going to install a Public Key Infrastructure consists of an offline Root CA and an online Sub CA. The offline Root CA will be installed on a server that is not member of Active ...
In the previous parts of this series, I have talked about encryption and signature algorithms and why Public Key Infrastructure exists. Next I have shown you step by step how to install a simple ...