Some aspects of traditional Windows application (win32) deployment using Microsoft Endpoint Manager (Intune) can be frustratingly elusive. Understanding a few things about the program environment and detection capabilities will help you be more successful with this tool. Please note that in this context, “win32” refers to native Windows applications, not 32-bit applications vs. 64-bit applications.… Read More »
In AlmaLinux (and Red Hat Enterprise Linux, Rocky Linux, and CentOS), libvirtd defaults to the user URI. When a regular user executes virsh list, they will see only the KVM virtual machines accessible to their user and will not see those started by the system. You can change this behavior so that regular users can… Read More »
This is an example kickstart for a typical system with a single disk (nvme0n1) and a single network adapter (ens160). These values may need to be changed to suit your environment. It will copy additional Assets to the target system as described in Customizing the AlmaLinux Installer Media. The resulting system uses LUKS full-disk encryption… Read More »
This article shows you how to customize the AlmaLinux (or Red Hat Enterprise Linux, or Rocky Linux, or CentOS Linux) installer media to include a kickstart file and additional file assets. Commands prepended with # should be run as root while commands prepended with $ should be run as your regular user. Prerequisites A basic… Read More »
An answer file makes it possible to deploy Windows with “zero touch”, meaning that all of the installation parameters are specified and the installation will proceed without further input from the technician. Warning! If your answer file is fully automated and includes a partitioning scheme, you run the risk of unintentionally wiping out a production… Read More »
How do you consistently deploy Windows unattended in an environment without network or server infrastructure?
Whether you are deploying, evaluating, testing, and/or developing a web-based application; experimenting with Apache configuration; learning about web-based security technologies; or any of many other possible scenarios, you may find yourself needing to secure a web site with a TLS certificate (commonly referred to as an SSL certificate). Securing a web server with TLS is… Read More »