Knowledge Base
Step-by-step guides and technical documentation for IT administrators and security professionals
Browse by Category
Claude
Guides for Anthropic Claude - Claude Code CLI, API usage, and AI assistant workflows
Gemini
Guides for Google Gemini - CLI installation, API setup, and leveraging the 1M token context
OpenAI
Guides for OpenAI tools - Codex CLI, ChatGPT, API usage, and coding assistant workflows
Copilot
Guides for GitHub Copilot - IDE setup, CLI usage, and productivity tips
CrowdStrike
Guides for deploying and managing CrowdStrike Falcon endpoint protection
Google Workspace
Administration guides for Google Workspace (formerly G Suite)
Microsoft
Guides for Microsoft accounts, Windows, Edge, and Microsoft products
Microsoft 365
How-to guides for Office 365 and Microsoft 365 administration
Amazon Web Services
Guides for AWS infrastructure, services, billing, and cloud operations
Google Cloud
Billing, cost management, and cloud operations for Google Cloud Platform
Microsoft Azure
Azure administration, billing, and cost management guides
Microsoft Intune
Device enrollment, compliance policies, and endpoint management with Microsoft Intune
Microsoft Defender
Endpoint protection, threat detection, and security management with Microsoft Defender
Proofpoint
Email security, threat protection, and compliance with Proofpoint
Microsoft Sentinel
SIEM operations, analytics rules, and incident response with Microsoft Sentinel
1Password Business
Team password management, vault administration, and security policies with 1Password
Check Point
Firewall management, threat prevention, and network security with Check Point
Security Compliance
How-to guides for security compliance, risk management, and security architecture with interactive planning tools
Featured Articles
How to Rotate IAM Access Keys in AWS
Complete guide to AWS IAM access key rotation including manual rotation steps, automated rotation with Lambda, detecting stale keys, and implementing organization-wide key rotation policies.
AWS Root Account Security Best Practices
Complete guide to securing your AWS root account with MFA, eliminating daily root usage, setting up break-glass procedures, and implementing account recovery safeguards.
AWS S3 CLI Commands Cheat Sheet (cp, ls, sync, and More)
Complete AWS S3 CLI cheat sheet with syntax, examples, and common use cases for aws s3 cp, aws s3 ls, aws s3 sync, and other essential commands.
How to Encrypt Data at Rest in AWS S3, EBS, and RDS
Complete guide to AWS data encryption at rest covering S3 bucket encryption (SSE-S3, SSE-KMS, SSE-C), EBS volume encryption, RDS database encryption, and KMS key management best practices.
AWS Secrets Manager Tutorial: Store, Rotate, and Access Secrets
Complete tutorial on using AWS Secrets Manager to create secrets, set up automatic rotation, and securely access credentials from Lambda, EC2, and other AWS services.
AWS VPC Network Segmentation Best Practices
Complete guide to AWS VPC network segmentation covering public and private subnet design, security groups, NACLs, VPC peering, Transit Gateway, and defense-in-depth network architecture.
Looking for something specific? Browse our categories above to find the guide you need.
Need Help with Your IT Infrastructure?
Our team of experts can help you implement, configure, and optimize your technology stack.