How-To Guides


How to Clone an Azure VM Instance to Another Region
Learn how to clone Azure VM instances across regions to have backup instances ready in the event of regional outages.
How to Clone an Azure VM Instance to Another Region
Learn how to clone Azure VM instances across regions to have backup instances ready in the event of regional outages.


How to Retrieve User Activity from GCP Logs
Quickly access user activity logs in GCP to assess potential security threats. Follow our guide to retrieve and review user activity efficiently.
How to Retrieve User Activity from GCP Logs
Quickly access user activity logs in GCP to assess potential security threats. Follow our guide to retrieve and review user activity efficiently.


How to Search for IOCs Across Devices in CrowdStrike
Learn how to search for Indicators of Compromise (IOCs) across devices in CrowdStrike to identify malware and prevent further infection.
How to Search for IOCs Across Devices in CrowdStrike
Learn how to search for Indicators of Compromise (IOCs) across devices in CrowdStrike to identify malware and prevent further infection.


How to Contain an Endpoint with CrowdStrike
Learn how to contain endpoints with CrowdStrike when malware is detected. Follow step-by-step instructions to reduce your risk effectively.
How to Contain an Endpoint with CrowdStrike
Learn how to contain endpoints with CrowdStrike when malware is detected. Follow step-by-step instructions to reduce your risk effectively.


How to Find and Remove Inactive CrowdStrike Falcon Sensors
Learn how to identify and remove inactive CrowdStrike Falcon sensors to avoid unnecessary costs and optimize your security setup.
How to Find and Remove Inactive CrowdStrike Falcon Sensors
Learn how to identify and remove inactive CrowdStrike Falcon sensors to avoid unnecessary costs and optimize your security setup.


How to Use Azure Activity Logs to Audit User Activity
Learn how to retrieve activity logs for a user in Azure to help your team assess the scope of a security incident. Follow our step-by-step guide.
How to Use Azure Activity Logs to Audit User Activity
Learn how to retrieve activity logs for a user in Azure to help your team assess the scope of a security incident. Follow our step-by-step guide.


How to Rollback Your Kubernetes Deployment with Kubectl
Learn how to rollback a Kubernetes deployment to a previous version using kubectl commands. Follow our guide to ensure stability in your cluster.
How to Rollback Your Kubernetes Deployment with Kubectl
Learn how to rollback a Kubernetes deployment to a previous version using kubectl commands. Follow our guide to ensure stability in your cluster.


How to Check Your GCP Account for Compliance
Learn how to check your GCP account for compliance with the latest CIS v2 Benchmark, covering 400 security best practices, using Blink.
How to Check Your GCP Account for Compliance
Learn how to check your GCP account for compliance with the latest CIS v2 Benchmark, covering 400 security best practices, using Blink.


How to Block Project Access for a Given User or Group in GCP
Learn how to block user or group access to a GCP project during a security event using the GCP Console and CLI in our step-by-step guide.
How to Block Project Access for a Given User or Group in GCP
Learn how to block user or group access to a GCP project during a security event using the GCP Console and CLI in our step-by-step guide.


How to Remove a Member from Your Organization in GitHub
Learn how to quickly remove compromised or departing users from your GitHub organization to maintain security.
How to Remove a Member from Your Organization in GitHub
Learn how to quickly remove compromised or departing users from your GitHub organization to maintain security.
Control your cloud security everywhere.
Cloud native, Decentralized, and Secure.Start transforming your cloud and security operations with Blink.