Security and Compliance
14 Guides
How to Enable Two-Factor Authentication (2FA) on Kamatera
Two-factor authentication (2FA) adds an extra layer of security to your cloud infrastructure by requiring a one-time verification code in…
How to Set Up Zabbix for Comprehensive Monitoring on Kamatera
Zabbix is an open-source and enterprise-level monitoring solution designed to track the performance and availability of your servers and apps.…
How to Create a Firewall on a Windows Server
A firewall acts as a barrier between your network and external networks. On operating systems, a firewall is your first…
How to Deploy an OPNSense Firewall on Kamatera
OPNSense is one of the most popular open-source firewall and routing platforms. It's known for its flexibility, robust features, and…
How to install Vesta Control Panel on Ubuntu
Vesta Control Panel is an open-source web-based hosting control panel that helps manage web servers efficiently. With Vesta Control Panel,…
How to install Microsoft Office Applications on Windows
Microsoft Office is designed to help you with various tasks, like presentations, spreadsheet management and word processing. Microsoft includes various…
How to Configure FortiGate VM for Network Security on Kamatera
FortiGate VM provides protection from a broad array of network threats. It is a virtualized version of Fortinet's FortiGate firewall,…
How to install CyberPanel on Kamatera
CyberPanel is a web hosting control panel that is designed to manage web servers with a user-friendly interface and advanced…
How to install and renew SSL certificates
SSL stands for Secure Sockets Layer. SSL certificates are digital certificates which provide a secure connection between the user’s browser…
How to open a port for incoming traffic in Windows Firewall
A firewall determines whether to permit or block network data based on predefined rules. When you first set up a…
How to Change the RDP Port
The Remote Desktop Protocol (RDP) provides a convenient way to access Windows computers and servers remotely. By default, RDP listens…
How to Whitelist IP Addresses Using an Internal Firewall on Linux
This guide explains how to allow specific IP addresses through your Linux server's firewall, a key step in keeping your…
How to Secure NGINX With Let’s Encrypt on Ubuntu 22.0
Securing NGINX with Let's Encrypt on Ubuntu 22.04 involves obtaining an SSL/TLS certificate from Let's Encrypt and configuring NGINX to…
How to Set Up SSH Keys on Ubuntu 20.04
SSH, an acronym for Secure Shell, serves as a robust mechanism to establish secure communication between your system and remote…