Author: ultroni1

  • Create, configure, and manage groups

    A Microsoft Entra group helps organize users, which makes it easier to manage permissions. Using groups lets the resource owner (or Microsoft Entra directory owner), assign a set of access permissions to all the members of the group, instead of having to provide the rights one-by-one. Groups allow us to define a security boundary and then add and remove specific users to grant or deny access with a minimum amount of effort. Even better, Microsoft Entra ID supports the ability to define membership based on rules – such as what department a user works in, or the job title they have.

    Microsoft Entra ID allows you to define two different types of groups.

    • Security groups – the most common type of groups and are used to manage member and computer access to shared resources for a group of users. For example, you can create a security group for a specific security policy. By doing it this way, you can give a set of permissions to all the members at once, instead of having to add permissions to each member individually. This option requires a Microsoft Entra administrator.
    • Microsoft 365 groups – provide collaboration opportunities by giving members access to a shared mailbox, calendar, files, SharePoint site, and more. This option also lets you give people outside of your organization access to the group. This option is available to users as well as admins.

    red hat certified engineer rhce malaysia

  • Create, configure, and manage users

    Every user who needs access to Azure resources needs an Azure user account. A user account contains all the information needed to authenticate the user during the sign-on process. Once authenticated Microsoft Entra ID builds an access token to authorize the user and determine what resources they can access and what they can do with those resources.

    You use the Microsoft Entra ID dashboard in the Azure portal to work with user objects. Keep in mind that you can only work with a single directory at a time. You can use the Directory + Subscription panel to switch directories. The dashboard also has a Switch directory button in the toolbar which makes it easy to switch to another available directory.

    mysql database training courses malaysia

  • Plan for upgrades and retirement

    At some point, you might have to decide whether to upgrade or retire company hardware. Several factors will help guide your decision on whether to upgrade or retire a system and purchase net new. First, you must decide whether upgrading is necessary. You base this decision on factors such as the age of the current computers, their performance, and the cost of upgrading compared to continuing to use them.

    In most cases, consider the following factors:

    • You’ll need facilities to store systems undergoing refurbishment and a place to store them until you return them to the user’s workspace.
    • You can upgrade software in place at a user’s workstation. However, upgrading an application to a new version requires more planning and testing than managing an update.
    • Some organizations have procedures to refurbish used equipment and test stock items before deployment or after users return them. New employees might need fully equipped computers to perform their duties.

    Retirement

    The retirement phase is an issue that every organization must eventually face. This phase focuses on successfully removing a system from production when it’s no longer useful. As you retire legacy systems and replace them with new systems, you must efficiently complete this effort without interrupting daily organizational business needs or end-users work. Eventually, all software systems become obsolete, or other systems supersede them. Hardware systems undergo upgrades, but sometimes you no longer require and should remove them.

    Other factors that you must consider when planning the retirement phase include:

    • IT professionals should perform computer pickup in a way that causes the least interruptions to users. Typically, you can do this during non-business hours by going to each department or room to retrieve computers. IT departments usually coordinate pickups with the distribution of new systems.
    • Like your refurbishing efforts, you should also prepare computers for reselling. If systems will go to an outside entity, ensure that sensitive information stored on hard drives and other magnetic media doesn’t travel outside your organization. As part of the retirement process, you should typically remove the data stored on drives. You can use many software tools to do this, and some machines can erase drives in bulk, even if the drives aren’t operational.
    • Your organization might require administrative processing, which refers to the paperwork necessary to inventory and account for all computer equipment removals and sales. You can accomplish this with an existing inventory system.
    • You might need to perform packing and shipping and a loading-dock area for pickups.
    • It would be best to consider the equipment’s residual or resale value for accounting. For example, companies assign laptops at a higher price than desktops. Some organizations give old equipment to charity and use such donations as part of their overall tax accommodation.

    red hat certified specialist in deployment and systems management malaysia

  • Plan an application deployment

    Application deployment planning consists of three phases: managing application inventory and compatibility, packaging applications, and providing life-cycle support.

    Application inventory and compatibility

    Application compatibility can have a far-reaching impact on your organization. You can significantly reduce that impact by adequately planning your application compatibility project. Updates to Windows rarely affect application compatibility; however, they can happen. Most applications will function as expected when upgrading from a previous OS, such as Windows 10, to Windows 11. However, there are typically always some applications (such as Anti-virus) that will require attention.

    Gathering an application inventory is the first step in understanding the effect of application compatibility changes in your environment. Microsoft offers tools to perform asset inventories, such as the Microsoft Intune Suite. For environments with thousands of managed applications, you can undertake an application compatibility project to reduce the number of applications in the environment, which will reduce the costs associated with application proliferation. An easy, immediate way to reduce the number of applications within an environment is to standardize the application versions across an organization.

    Newer applications might supersede many older applications that provide similar functionality, thus enabling you to remove older applications. You eliminate corresponding licensing and support costs every time you remove an application. During an application compatibility project, you can analyze application compatibility across your entire enterprise.

    red hat certified specialist in red hat enterprise linux diagnostics and troubleshooting malaysia

  • Examine desktop deployment

    Deployments comprise the activities that make a computer device available for use. The general deployment process consists of several interrelated activities, with transitions between the build and deployment phases.

    The desktop deployment life cycle provides a framework for the tasks required to deploy a software application or operating system successfully. It would be best if you understood the lifecycle phases to properly plan for the resources and tools needed for effective implementation. The critical phases of the desktop deployment lifecycle are Building and Deploying.

    Building

    The building phase allows you to improve efficiencies when developing a strategy for a base OS configuration. Its key steps include:

    • Streamlining the deployment process: This step includes developing automated solutions and procedures that you can use for deployment.
    • Developing the deployment process: Using traditional imaging might consist of a baseline OS image. Using newer features such as Windows Autopilot might involve creating a base device configuration.
    • Testing: With a test system, you might identify and correct errors before deployment. Many IT professionals use Virtual machines to simulate deployment and validate configurations quickly and effectively; however, a testing plan should include testing deployments to physical devices before deployment.
    • Configuration: This step includes developing an automation solution, testing and configuring standardized images or device configurations, accounting for IT labor to configure computers, and planning for network access configuration.
    • Managing the logistics: This step includes storing computers, deploying and setting up physical hardware, and communicating to end users. This step can also include providing the hardware vendor with configuration requirements to be done by the vendor before shipping the device to the organization.

    red hat certified specialist in linux performance tuning malaysia

  • Examine planning and purchasing

    Before making any purchasing decisions, organizations should carefully plan their requirements for new systems. Most organizations have a mix of old and new devices. They can replace some of these devices with new equipment and upgrade others to Windows 11. Upgrades require careful planning to ensure they work correctly and efficiently. During the upgrade process, correct any previous operating system misconfiguration.

    The Planning stage includes:

    • Computer strategy: This planning stage includes policies such as image and hardware standardization, environment design, replacement frequency, mobile device versus desktop usage, and Bring-Your-Own-Device (BYOD) policies.
    • Computer selection: This process involves choosing hardware, software, and peripherals. It includes design configuration and application compatibility testing.
    • Deployment methods: Each deployment method includes inherent costs to support that method. Often, IT professionals can use multiple deployment methods to accommodate different scenarios. You should determine whether a cloud-based solution addresses your deployment requirements or what requirements you needed for a device to enroll.
    • Demand forecasting: This stage is the organization’s attempt at predicting its future computing resource requirements to determine the resources it needs to purchase.
    • Design configuration: This process determines which new features you use and how to incorporate them into the overall plan. The new tools, resources, and settings can dramatically simplify configuration processes.

    Purchasing involves getting personnel, material, services, or property from a vendor through allowed means. It’s the action or process of acquiring items at the operational level. The purchasing process includes negotiation, contracts, vendor management, shipping, and disposal of packaging materials.

    red hat certified specialist in server hardening malaysia

  • Examine the enterprise desktop life-cycle model

    IT departments must be able to meet user requirements. The technologies must be flexible and able to support an environment where work styles change rapidly across different devices and locations. Additionally, companies often expect IT departments to do more to improve business efficiency with fewer resources. An established device life cycle ensures organizations have the right technologies in place for users to remain productive. The life-cycle also ensures that when devices have reached end-of-life, they don’t become a liability. In today’s environment, where users frequently use personal devices, they also become part of that life cycle.

    Organizations constantly manage the different phases of the enterprise desktop life cycle. These phases include:

    • Planning: Preparing defining a strategy for system management.
    • Purchasing: Processing requisitions, and then obtaining approval of invoices for payment.
    • Deployment: Installing an operating system, enrolling devices, and deploying applications to the device.
    • Operations: Ensuring that systems are functioning properly and are protected.
    • Support: Ensuring that the end users learn how to use their systems and applications, and receive the support they need.
    • Upgrade and Retire: This phase includes replacing devices, retiring obsolete hardware, or unenrolling a device from the organization.

    red hat enterprise linux rhel training courses malaysia

  • Examine benefits of modern management

    Until recently, managing an organization’s technological infrastructure and PCs required IT professionals to do lots of hands-on, manual, and time-consuming tasks. New device form factors, new approaches in Windows client management, advancements in cloud technology, and bring-your-own-device (BYOD) trends have made modern endpoint management more interesting for many organizations – not only for mobile devices but also PCs.

    Modern endpoint management is a novel approach to managing Windows, similar to managing mobile devices using Enterprise Mobility Management (EMM) solutions. This approach allows you to simplify deployment and management, improve security, provide better end-user experiences, and lower costs for your Windows devices. With modern endpoint management, you can now manage devices of all kinds, desktop PCs, HoloLens, Surface Hubs, company-owned devices, employee-owned devices, and even mobile devices running iOS or Android, all while using one management platform. Let’s examine why you should implement a modern endpoint management approach for Windows devices within your organization.

    red hat linux administration training courses malaysia

  • Bash commands and operators

    Every shell language has its most-used commands. Let’s start building your Bash repertoire by examining the most commonly used commands.

    Bash commands

    Let’s look at common Bash commands and how to use them.

    ls command

    ls lists the contents of your current directory or the directory specified in an argument to the command. By itself, it lists the files and directories in the current directory:

    BashCopy

    ls
    

    Files and directories whose names begin with a period are hidden by default. To include these items in a directory listing, use an -a flag:

    BashCopy

    ls -a
    

    To get even more information about the files and directories in the current directory, use an -l flag:

    BashCopy

    ls -l
    

    Here’s some sample output from a directory that contains a handful of JPEGs and PNGs and a subdirectory named gifs:

    OutputCopy

    -rw-rw-r-- 1 azureuser azureuser  473774 Jun 13 15:38 0001.png
    -rw-rw-r-- 1 azureuser azureuser 1557965 Jun 13 14:43 0002.jpg
    -rw-rw-r-- 1 azureuser azureuser  473774 Mar 26 09:21 0003.png
    -rw-rw-r-- 1 azureuser azureuser 4193680 Jun 13 09:40 0004.jpg
    -rw-rw-r-- 1 azureuser azureuser  423325 Jun 10 12:53 0005.jpg
    -rw-rw-r-- 1 azureuser azureuser 2278001 Jun 12 04:21 0006.jpg
    -rw-rw-r-- 1 azureuser azureuser 1220517 Jun 13 14:44 0007.jpg
    drwxrwxr-x 2 azureuser azureuser    4096 Jun 13 20:16 gifs
    

    Each line provides detailed information about the corresponding file or directory. That information includes the permissions assigned to it, its owner, its size in bytes, the last time it was modified, and the file or directory name.

    red hat linux certification malaysia

  • Bash fundamentals

    An understanding of Bash starts with an understanding of Bash syntax. After you know the syntax, you can apply it to every Bash command you run.

    The full syntax for a Bash command is:

    BashCopy

    command [options] [arguments]
    

    Bash treats the first string it encounters as a command. The following command uses Bash’s ls (for “list”) command to display the contents of the current working directory:

    BashCopy

    ls
    

    Arguments often accompany Bash commands. For example, you can include a path name in an ls command to list the contents of another directory:

    BashCopy

    ls /etc
    

    Most Bash commands have options for modifying how they work. Options, also called flags, give a command more specific instructions. As an example, files and directories whose names begin with a period are hidden from the user and aren’t displayed by ls. However, you can include the -a (for “all”) flag in an ls command and see everything in the target directory:

    BashCopy

    ls -a /etc
    

    You can even combine flags for brevity. For example, rather than enter ls -a -l /etc to show all files and directories in Linux’s /etc directory in long form, you can enter this instead:

    BashCopy

    ls -al /etc
    

    Bash is concise. It’s sometimes remarkable (and a point of pride among Bash aficionados) how much you can accomplish with a single command.

    sap erp procurement material management training courses malaysia