Cleaning up inactive sensors in CrowdStrike ensures that you aren't paying for resources you are not using. In this guide, we'll show you how to identify and clean up inactive sensors.
If you encounter computing issues in a certain area, it's helpful to have backup instances ready. In this guide, we'll show you how to prepare by copying Azure VM instances from one region to another.
If one of your employees has their account compromised, being able to quickly see their GCP user activity can help you assess the threat. In this guide, we'll show you how to quickly get a user's activity logs from GCP.
When malware is detected on a device, you can contain that endpoint with CrowdStrike to reduce your risk. In this guide, we'll show you how to take these containment steps.
If malware is detected on one device at your organization, it might not be the only one. In this guide, we'll show you how to search whether any other devices have encountered the same IOCs.
When dealing with a security incident, getting relevant activity logs can help your team understand the scope of the threat. In this guide, we'll show you how to get the activity logs for a given user in Azure.
If you are dealing with a security event, you may want to block a user or group's access to a GCP project. In this guide, we'll show you how to block access using the GCP Console and CLI.
The CIS Benchmarks for GCP are a collection of 400 security best practices. In this guide, we'll explain the basics of the latest version of CIS Benchmark for GCP and how you can check for compliance with Blink.
If a new Deployment to your Kubernetes cluster is not stable, you may want to rollback to a prior version. In this guide, we'll show you how to do this with kubectl commands.
The Blink monthly newsletter includes details about the latest Blink news, featured articles from our blog, and how-to guides for solving common security and platform operations challenges.
Blink is secure, decentralized, and cloud-native. Get modern security and platform operations today.