Knowledge Base

Step-by-step guides and technical documentation for IT administrators and security professionals

Browse by Category

15 articles

Claude

Guides for Anthropic Claude - Claude Code CLI, API usage, and AI assistant workflows

View Articles
17 articles

Gemini

Guides for Google Gemini - CLI installation, API setup, and leveraging the 1M token context

View Articles
14 articles

OpenAI

Guides for OpenAI tools - Codex CLI, ChatGPT, API usage, and coding assistant workflows

View Articles
18 articles

Copilot

Guides for GitHub Copilot - IDE setup, CLI usage, and productivity tips

View Articles
35 articles

CrowdStrike

Guides for deploying and managing CrowdStrike Falcon endpoint protection

View Articles
22 articles

Google Workspace

Administration guides for Google Workspace (formerly G Suite)

View Articles
31 articles

Microsoft

Guides for Microsoft accounts, Windows, Edge, and Microsoft products

View Articles
14 articles

Microsoft 365

How-to guides for Office 365 and Microsoft 365 administration

View Articles
19 articles

Amazon Web Services

Guides for AWS infrastructure, services, billing, and cloud operations

View Articles
28 articles

Google Cloud

Billing, cost management, and cloud operations for Google Cloud Platform

View Articles
37 articles

Microsoft Azure

Azure administration, billing, and cost management guides

View Articles
5 articles

Microsoft Intune

Device enrollment, compliance policies, and endpoint management with Microsoft Intune

View Articles
5 articles

Microsoft Defender

Endpoint protection, threat detection, and security management with Microsoft Defender

View Articles
5 articles

Proofpoint

Email security, threat protection, and compliance with Proofpoint

View Articles
5 articles

Microsoft Sentinel

SIEM operations, analytics rules, and incident response with Microsoft Sentinel

View Articles
5 articles

1Password Business

Team password management, vault administration, and security policies with 1Password

View Articles
20 articles

Check Point

Firewall management, threat prevention, and network security with Check Point

View Articles
16 articles

Security Compliance

How-to guides for security compliance, risk management, and security architecture with interactive planning tools

View Articles
Amazon Web Servicesintermediate

How to Rotate IAM Access Keys in AWS

Complete guide to AWS IAM access key rotation including manual rotation steps, automated rotation with Lambda, detecting stale keys, and implementing organization-wide key rotation policies.

9 min readRead More →
Amazon Web Servicesbeginner

AWS Root Account Security Best Practices

Complete guide to securing your AWS root account with MFA, eliminating daily root usage, setting up break-glass procedures, and implementing account recovery safeguards.

8 min readRead More →
Amazon Web Servicesintermediate

AWS S3 CLI Commands Cheat Sheet (cp, ls, sync, and More)

Complete AWS S3 CLI cheat sheet with syntax, examples, and common use cases for aws s3 cp, aws s3 ls, aws s3 sync, and other essential commands.

8 min readRead More →
Amazon Web Servicesintermediate

How to Encrypt Data at Rest in AWS S3, EBS, and RDS

Complete guide to AWS data encryption at rest covering S3 bucket encryption (SSE-S3, SSE-KMS, SSE-C), EBS volume encryption, RDS database encryption, and KMS key management best practices.

10 min readRead More →
Amazon Web Servicesintermediate

AWS Secrets Manager Tutorial: Store, Rotate, and Access Secrets

Complete tutorial on using AWS Secrets Manager to create secrets, set up automatic rotation, and securely access credentials from Lambda, EC2, and other AWS services.

10 min readRead More →
Amazon Web Servicesintermediate

AWS VPC Network Segmentation Best Practices

Complete guide to AWS VPC network segmentation covering public and private subnet design, security groups, NACLs, VPC peering, Transit Gateway, and defense-in-depth network architecture.

11 min readRead More →

Looking for something specific? Browse our categories above to find the guide you need.

Need Help with Your IT Infrastructure?

Our team of experts can help you implement, configure, and optimize your technology stack.