Essential Reference Guide

IT System Administrator
Cheat Sheet

A practical reference for Unix/Linux, PowerShell, network ports, and the gold rules every SysAdmin lives by.

4Sections
7Unix Commands
6PS Cmdlets
14Key Ports

Legend

01 /

Unix/Linux Mastery

Efficiency, system health, and log analysis — the commands you'll reach for every single day.
02 /

PowerShell Proficiency

Automation, Active Directory, and Windows internals — cmdlets you'll use daily in any Windows environment.
03 /

Default Network Ports

Memorize these for firewall rules and connectivity troubleshooting — the ports you'll reference on every ticket.
Remote Access & Management
  • Network SSH / SFTP — Secure Shell & File Transfer
    The standard for encrypted remote access and secure file transfer. Should be your default for any remote terminal work — never use Telnet.
    :22
  • Network Warning Telnet — Unencrypted Remote Access
    Transmits everything in plaintext — credentials included. Block it at the firewall. Only relevant for legacy hardware that doesn't support SSH.
    :23
  • Network RDP — Remote Desktop Protocol
    Windows GUI remote access. Always restrict this port to a VPN or specific IP ranges — exposed RDP on the internet is a primary ransomware vector.
    :3389
Web & Directory Services
  • Network HTTP / HTTPS — Web Traffic
    All modern web traffic should be on 443. If you see 80 open in production without a redirect, that's a misconfiguration. Force HTTPS at the load balancer or server level.
    :80 / :443
  • Network DNS — Domain Name System (TCP/UDP)
    Most queries run over UDP; TCP is used for large responses and zone transfers. If DNS is broken, nearly everything breaks — always check this first when connectivity goes down.
    :53
  • Network LDAP / LDAPS — Active Directory
    389 is unencrypted LDAP — prefer LDAPS on 636 in any environment handling credentials. Required for AD authentication, group policy, and directory lookups.
    :389 / :636
File & Email
  • Network SMTP — Email Sending
    Port 25 is server-to-server. Use 587 (STARTTLS) for client submission — most ISPs block outbound 25 from residential IPs to prevent spam.
    :25 / :587
  • Network IMAP — Email Retrieval
    143 is standard IMAP (unencrypted); 993 is IMAPS (SSL/TLS). Always configure clients to use 993. IMAP keeps mail on the server — good for multi-device access.
    :143 / :993
  • Network SMB — Windows File Sharing
    Used for Windows network shares, printers, and inter-process communication. Block this at your perimeter firewall — it should never be exposed to the internet (EternalBlue).
    :445
  • Network NFS — Network File System
    Linux/Unix network file sharing. Restrict access via /etc/exports and firewall rules — NFS has no built-in encryption, so use it only on trusted internal networks.
    :2049
04 /

The SysAdmin Gold Rules

The principles that separate good administrators from great ones — internalize these and they'll save you from disasters.
📋 Quick Reference

Unix/Linux commands work on any modern Linux distro and macOS terminal. Some (like netstat) may require net-tools to be installed — on newer systems, ss -tulpn is the preferred alternative.

PowerShell cmdlets require the appropriate modules — Get-ADUser needs the ActiveDirectory RSAT module installed. Run PowerShell as Administrator for any commands that touch services, event logs, or remote machines.

Port numbers listed are defaults — applications can be configured to listen on non-standard ports. Always verify with netstat or ss rather than assuming.