/Gopal
Avatar for Gopal

About Gopal

I am a Systems and Networking Engineer, managing everything that comes under IT. I have been with Vembu for over 10 years.
11 05, 2020

Microsoft 365 Security Center: An Overview

By | May 11th, 2020|0 Comments

Introduction : Office 365 became Microsoft 365 now with several other additional services, that includes Windows 10 Enterprise, Enterprise mobility & security services. Similarly, Office 365 Security & Compliance became Microsoft 365 Security Center and Compliance Center. In the old Office 365 portal, you can [...]

6 05, 2020

How-to Guide: Importing Oracle Virtualbox VM to Oracle Cloud Infrastructure

By | May 6th, 2020|0 Comments

Introduction In this How-to blog, we are detailing how an Oracle Virtualbox VM imported into OCI to create similar OCI Instances using the imported custom image. This involves three steps: Preparing a Oracle Virtualbox VM for importing Importing a Oracle Virtualbox VM to OCI as [...]

5 05, 2020

How-to Guide: Integrating Oracle VM Virtualbox to Oracle Cloud Infrastructure (OCI)

By | May 5th, 2020|0 Comments

Introduction: In this How-to, we are discussing Oracle VM Virtualbox advanced features for running a guest OS and providing the steps to integrate Oracle VM Virtual Manager with Oracle cloud infrastructure. With Oracle VM Virtualbox 6.0 release, the capability to export a virtual machine and [...]

4 05, 2020

How-to Guide: Installing Oracle Virtualbox & Extension Pack on a Windows Server Machine

By | May 4th, 2020|0 Comments

Introduction What is Oracle Virtualbox? Oracle VM Virtualbox is a free open source hypervisor to run on X86 server / desktop machines to host more guest operating systems on it independently and simultaneously. All the guest operating systems hardware is emulated by the host hypervisor. [...]

22 04, 2020

How to Install Kali Linux on a Hyper-V VM

By | April 22nd, 2020|0 Comments

Introduction: What is Kali Linux? Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools that are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics, and Reverse Engineering. Kali [...]

13 04, 2020

How-to Guide: Creating Hyper-V Shielded VMs and Protecting them using Vembu

By | April 13th, 2020|0 Comments

Introduction What is a shielded VM? Shielded VMs, or Shielded Virtual Machines, are a security feature introduced in Windows Server 2016 for protecting Hyper-V Generation 2 virtual machines (VMs) from unauthorized access or tampering by using a combination of techniques like Secure boot, Bit-locker encryption, [...]

6 04, 2020

How-to Guide: Configuring Amazon S3 as the Backup Repository for Vembu BDR Backup Server (On-premise)

By | April 6th, 2020|0 Comments

Introduction In this How-To guide, we will walk through the process of configuring Amazon S3 storage as a backup repository deployed in your on-premise Vembu BDR Backup Server. As your business grows you may not know how much storage capacity could be required for your [...]

14 12, 2016

Setting up Mobile Device Management for an Office 365 tenant

By | December 14th, 2016|2 Comments

What is MDM for Office 365? The built-in Mobile Device Management (MDM) for Office 365 helps you secure and manage your users' mobile devices like iPhones, iPads, Androids, and Windows phones. You can create and manage device security policies, remotely wipe a device, and view [...]