Practical, copy-paste runbooks for secure networks & systems — MikroTik, Windows, Linux, VMware, and Wazuh. Each guide includes verification and rollback steps.
Routing, firewall, VLANs, multi-WAN, and safe change runbooks for RouterOS.
WireGuard/IPsec remote access and site-to-site guides with verification and rollback.
Defender/ASR, auditing, PowerShell automation, and admin runbooks.
Purpose This checklist provides a structured guide for the first 30 minutes of any security incident, reducing panic-driven decisions and ensuring consistent…
Privilege escalation often follows an initial foothold. Early identification and controlled response are critical to limit damage while preserving evidence. Detection Indicators…
RDP brute force attacks are among the most common intrusion attempts against Windows systems. This runbook provides a structured response workflow focused…
Applying patches reduces risk, but unplanned outages often come from missing validation and rollback planning. This runbook outlines a conservative, production-safe patching…
Sustained high CPU usage impacts application latency and system stability. This guide provides a structured, low-risk triage method before tuning or scaling…
A Wazuh agent can appear installed and running while silently failing to deliver logs to the manager. This runbook focuses on end-to-end…