Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form

Category: Network | Monitoring

Explore essential network concepts, monitoring, configurations, and troubleshooting tips to ensure secure and reliable connectivity for your systems and devices

How to disable web console in Cisco switches

Posted on 31/07/201923/11/2025 Christian By Christian No Comments on How to disable web console in Cisco switches

Conventional network security often focuses more on routers and blocking traffic from the outside. Switches are internal to the organization and designed to allow ease of connectivity, therefore only limited or no security measures are applied. Therefore a HTTPS access is not entirely necessary. to disable web console in Cisco switches, From CLI type When…

Read More “How to disable web console in Cisco switches” »

Network | Monitoring

How to Reset a Cisco 3650 Catalyst Switch

Posted on 31/07/201926/10/2023 Christian By Christian 1 Comment on How to Reset a Cisco 3650 Catalyst Switch
How to Reset a Cisco 3650 Catalyst Switch

Follow the guide on how to Reset a Cisco 3650 Catalyst Switch. This is useful when you want to remove an undesirable configuration that is present in the switch. If you have configured a switch and the configuration has become very complex or if you want to move a switch from one network to another….

Read More “How to Reset a Cisco 3650 Catalyst Switch” »

Network | Monitoring

How to disable Outlook and Yahoo Auto-Complete

Posted on 08/06/201925/10/2023 Christian By Christian 2 Comments on How to disable Outlook and Yahoo Auto-Complete
How to disable Outlook and Yahoo Auto-Complete

Outlook will show the nicknames and automatic completion cache as a pull down list which are the recent addresses resolved and sent. You may enter the wrong address for a recipient or the recipient changes their address. You can refer to the following steps to remove an address from this list or clear the entire…

Read More “How to disable Outlook and Yahoo Auto-Complete” »

Network | Monitoring

How does IP Address or Domain blacklist work?

Posted on 19/01/201928/08/2024 Christian By Christian No Comments on How does IP Address or Domain blacklist work?
How does IP Address or Domain blacklist work?

A blacklist is a list of IP addresses or domains that are known sources of spam. Often referred to as DNSBLs (Domain Name System Blacklists). The technology is built on top of DNS. Most MTAs can be configured to reject or flag messages that have been sent from a blacklisted IP. In this article, you…

Read More “How does IP Address or Domain blacklist work?” »

Network | Monitoring

How to prevent emails from going into a junk folder in Office365

Posted on 18/12/201826/09/2023 Christian By Christian No Comments on How to prevent emails from going into a junk folder in Office365
How to prevent emails from going into a junk folder in Office365

My use case was Nagios notification not delivering into our user’s inbox but rather into the Junk folder because of not having the right domain name. In other to prevent this false positive from moving emails from a specific Email ID to the JUNK folder in Outlook. Kindly refer to this related guide: How to…

Read More “How to prevent emails from going into a junk folder in Office365” »

Network | Monitoring

How to Reset a Snom Phone

Posted on 18/12/201825/03/2024 Christian By Christian No Comments on How to Reset a Snom Phone
How to Reset a Snom Phone

This short piece will discuss how to reset a Snom Phone. Having had various scenarios where an existing configuration of the phone system cannot be overwritten or reconfigured. I found a simple solution to restore to factory settings and could reconfigure the telephone system and assign the right IP Address etc. to the phone. How…

Read More “How to Reset a Snom Phone” »

Network | Monitoring

How to setup and configure Jitsi as SoftPhone

Posted on 09/03/201821/03/2024 Christian By Christian No Comments on How to setup and configure Jitsi as SoftPhone
How to setup and configure Jitsi as SoftPhone

Jitsi is a Secure and Simple Video Conferencing and Instant Messaging application that can be run on Windows, Linux, Mac etc. This is a standalone application that supports instant messaging and telephony protocols (OTR and SIP etc.). In this article, you will learn how to set up and configure Jitsi as SoftPhone. Here are some…

Read More “How to setup and configure Jitsi as SoftPhone” »

Network | Monitoring

How to grant Access to User Mailbox

Posted on 18/11/201716/07/2024 Christian By Christian No Comments on How to grant Access to User Mailbox
How to grant Access to User Mailbox

This article will discuss the steps on How to grant Access to User Mailbox. Since we will be utilizing the Exchange Admin Center (EMC) for this, lets discuss what it is. EAC is the web-based management console in Exchange Server that’s optimized for on-premises, online, and hybrid Exchange deployments. Please see How to add or…

Read More “How to grant Access to User Mailbox” »

Network | Monitoring

How to configure WatchGuard WebCenter

Posted on 16/11/201723/04/2024 Christian By Christian No Comments on How to configure WatchGuard WebCenter
How to configure WatchGuard WebCenter

In this guide, we shall discuss “how to configure WatchGuard WebCenter”. When you configure WatchGuard WebCenter, you unlock a dynamic, interactive, real-time web UI application. With just a click, seamlessly navigate pages, access detailed log messages, reports, and certificate management. Here are other exciting guides on Microsoft apps to read about: How to Use a Whiteboard…

Read More “How to configure WatchGuard WebCenter” »

Network | Monitoring

How to set up WatchGuard Log Server

Posted on 16/11/201709/10/2024 Christian By Christian No Comments on How to set up WatchGuard Log Server
How to set up WatchGuard Log Server

In this article, we shall discuss the steps on how to set up WatchGuard Log Server. To effectively manage your network security, it’s crucial to set up a WatchGuard Log Server. This key component of WatchGuard Server Center acts as a local database, efficiently collecting log message data from every connected Firebox. Nonetheless, Gain real-time…

Read More “How to set up WatchGuard Log Server” »

Network | Monitoring

WatchGuard Log and Report Server Installation in a VM

Posted on 10/01/201714/08/2023 Christian By Christian No Comments on WatchGuard Log and Report Server Installation in a VM
WatchGuard Log and Report Server Installation in a VM

The WatchGuard Log and Report Server’s network security core seamlessly integrates with the WatchGuard Server Center. Moreover, This powerful tool serves as a local database, efficiently gathering log message data from all connected Firebox devices. However, WatchGuard Log and Report Server offer default traffic monitoring to view log messages from your Firebox (XTM device) and…

Read More “WatchGuard Log and Report Server Installation in a VM” »

Network | Monitoring

How to Monitor Windows Hosts via Nagios

Posted on 10/01/201724/09/2024 Dickson Victor By Dickson Victor No Comments on How to Monitor Windows Hosts via Nagios
How to Monitor Windows Hosts via Nagios

Learn how to effectively monitor Windows hosts using Nagios Core is an open-source monitoring system designed to monitor systems, networks, and infrastructure (Get metrics for CPU, Disk, Memory, and Services with ease). It provides alerts and notifications about issues and performance problems, allowing system administrators to respond accordingly. Please see how to Block downloads on…

Read More “How to Monitor Windows Hosts via Nagios” »

Network | Monitoring

How to enable ssh via ASDM on Cisco ASA

Posted on 02/11/201608/09/2024 Christian By Christian No Comments on How to enable ssh via ASDM on Cisco ASA
How to enable ssh via ASDM on Cisco ASA

To enhance security, enable SSH via ASDM for secure access to Cisco ASA. Utilize port 22 for secure SSH connections, replacing Telnet’s vulnerability. Authenticate remote users with public key cryptography. Configure SSH access using these steps on your Cisco ASA device. This post will show you how to enable ssh via ASDM on Cisco ASA…

Read More “How to enable ssh via ASDM on Cisco ASA” »

Network | Monitoring

Posts pagination

Previous 1 … 10 11 12 … 14 Next

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • password manager pro enterprise
    Configure failover for ManageEngine Password Manager Pro Password Manager
  • MachineAccountQuota
    Change the number of MachineAccountQuota a user can add to AD Windows Server
  • Recovery keys in AD 1
    Backup existing and new BitLocker Recovery Keys to Active Directory Windows Server
  • Featured Image 3
    How to enable Secure Boot on PC to install Windows 11 Windows
  • screenshot 2020 02 13 at 22.47.41
    Active Directory Flexible Single-Master Operations Roles [FSMO] Windows Server
  • Wingettool
    Install and Manage Applications with Winget Windows
  • fgbv
    Export and Import Scheduled Tasks in Windows Windows Server
  • Featured image Clearing cache
    How to clear cache in Windows 11 Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,814 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive