PowerCLI Script to Find and Remove Unused Virtual Disks and ISOs
Introduction Get-VM | Where-Object {($_ | Get-HardDisk).Count -gt 3} | Select Name, PowerState, @{N=”DiskCount”;E={($_ | Get-HardDisk).Count}}…
Introduction Get-VM | Where-Object {($_ | Get-HardDisk).Count -gt 3} | Select Name, PowerState, @{N=”DiskCount”;E={($_ | Get-HardDisk).Count}}…
Introduction $timestamp = Get-Date -Format “yyyyMMdd”Export-Csv -Path “C:ReportsVM_Inventory_$timestamp.csv” -NoTypeInformation Step 4: Filter by Folder or Cluster…
Introduction Get-VM | Where-Object {$_.PowerState -eq “PoweredOff”} | Get-Snapshot | Remove-Snapshot -Confirm:$false Diagram: Snapshot Lifecycle Workflow…
Introduction Get-ChildItem “D:VMBackups” -Filter *.ova | Where-Object {$_.LastWriteTime -lt (Get-Date).AddDays(-10)} | Remove-Item Diagram: DR Workflow with…
Introduction Security-sensitive workloads often require encryption at rest and support for virtual TPM (vTPM) devices. These…
Introduction In the next article, we will cover: $servers = Import-Csv “C:ConfigsLinuxVMs.csv”You can store custom values…
Table of Contents Introduction NSX Intelligence NAPP Architecture Deep Dive Real-World Deployment Patterns Microsegmentation with NSX…
What’s New in VCF 9 (with NSX) GUI steps and automation for these features follow similar…
Introduction Bicep Example: If you’re an architect or engineer aiming to master network automation, policy enforcement,…
Introduction Scenario:Manufacturing plant with strict separation between OT (operational tech) and IT, high security, and real-time…
Table of Contents Overview East-West vs. North-South: Key Traffic Patterns NSX-T 4.x Architecture Explained Traffic Flow…
Introduction {“siem_type”: “Splunk”,”endpoint”: “https://splunk.example.com:8088″,”token”: “your-splunk-token”,”events”: [“alert”, “policy_change”, “login”]} SOAR/Incident Response Integration Use Webhooks or REST API…
Introduction Workflow 2: Telemedicine Visit Table of Contents Executive Overview Healthcare Security Challenges Solution Architecture Overview…
One challenge of correlating all of the attack stages together is the events for uploading an…