Privileged Identity Management (PIM) - Getting Started
Complete guide to implementing Microsoft Entra Privileged Identity Management (PIM) for enterprise environments, focusing on zero-trust principles and just-in-time access management.
Technical guides, setup instructions, and documentation for homelab projects and infrastructure.
2 parts in this series
Complete guide to implementing Microsoft Entra Privileged Identity Management (PIM) for enterprise environments, focusing on zero-trust principles and just-in-time access management.
Comprehensive guide to implementing PIM for Groups to manage privileged access through security groups, enabling just-in-time membership and automated workflows for complex enterprise scenarios.
2 parts in this series
Introduction to Windows Defender Application Control (WDAC) deployment via Microsoft Intune for enterprise endpoint security and application control.
Step-by-step guide to creating your first WDAC policy using SpyNetGirl's AppControl Manager tool, from base policy creation to enforcement mode deployment.
4 parts in this series
Setting up Windows desktop with WSL, Nix, and configuring the homelab repository for Kubernetes deployment
Manual setup of Dell Optiplex 7050 mini PCs, BIOS configuration, network discovery, and Docker installation for Kubernetes homelab
Setting up Tailscale with Unraid for secure remote access to Jellyfin media server using Tailscale Funnel
Complete guide for setting up a Dokploy cluster on mini PCs with Ubuntu Server, Tailscale networking, and Docker Swarm