Welcome to the Community Library, where you will find how-tos, guides and blogs from the Advania experts.
It looks like you're new here. Sign in or register to get started.
The Advania Community platform will be closing soon.
From 28 April 2026, the platform will move to read-only access, and will be fully closed on 5 May 2026.
Please save or download any content you wish to keep before closure.
You can continue to stay connected with Advania via:
Thank you for being part of the Advania Community.
Dive into all things Cyber Security. Discover best practices, hands-on guides and expert insights to keep your people and data safe.
Discover actionable tips, best practices, and resources on topics like remote collaboration, digital workplace solutions, and productivity enhancements.
Explore articles, guides, and best practices on using AI to drive innovation and efficiency.
This is your hub for insights, how-tos, and real-world guidance on building and optimising your cloud environment.
We're very intentional about evolving our services at Advania - the value you get from us as a client should always increase over time, and the technology landscape and opportunities and threats faced by organisations never stand still. Our Products & Services function is the group tasked with continual evolution of our…
Microsoft Entra Backup and Recovery is a new built-in solution (currently in public preview) that automatically backs up critical Microsoft Entra ID (Azure Active Directory) objects and allows administrators to restore them to a previous good state after accidental changes or security incidents. It captures daily snapshots…
What Cisco Talos’ 2025 Year in Review tells us about modern cyber risk and what organisations should do next The Cisco Talos 2025 Year in Review makes one thing abundantly clear: cyber attackers are no longer winning because they are more sophisticated, they are winning because they are faster. Across vulnerabilities,…
I recently experimented with Microsoft's new Windows 365 for Agents service by building an AI agent to tackle a real-world task, and the results were eye-opening. Within minutes, the platform automatically provisioned two Cloud PCs running Windows 365 to execute my agent’s workflow. Even more impressively, I was able to…
The rise of AI in cyber threats Over the past few years, there have undoubtedly been significant developments in the AI landscape. These include, more recently, the emergence of agentic AI, where AI agents are able to perform autonomous, multi-step tasks, and multimodal AI, where models are able to process multiple types…
AI demand has collided with limited memory manufacturing capacity, pushing server RAM and storage prices up fast and squeezing lead times. That doesn’t mean progress has to stall. There is no simple magic fix, but we can help you navigate the situation to deliver outcomes for your organization. Why memory is tight (and why…