In this last part of my AppLocker series, I explain how you can harden AppLocker. Although AppLocker can dramatically...
AppLocker Audit vs. Enforced mode

If you haven't done so already, you should first read my previous AppLocker article, where we created our AppLocker...
Creating AppLocker rules from the Windows event log

In my last post, I discussed some AppLocker best practices and concluded that you have to start with gathering...
AppLocker best practices

In my last post, I explained why I prefer AppLocker whitelisting over blacklisting. In this article, I will describe...
AppLocker whitelisting vs. blacklisting

I have deployed AppLocker for hundreds of thousands of computers and customers ranging from a nuclear plant and military-level...
Creating a complete memory dump without a Blue Screen

When an error is escalated, one of the most common requests is to get a full memory dump of...
How to access the SAM and SECURITY hives in the Registry using the SYSTEM account

Many people think the built-in Administrator account is the most powerful account in Windows, which is not true. If...
Capturing error messages and looking up text for error code numbers

When it comes to troubleshooting end-user PCs, you often have to deal with cryptic error messages with unknown error...
How to capture a network trace from a remote computer

To start any troubleshooting case, I always ask for two things. I ask for a Process Monitor trace, which...
Using Process Monitor (Procmon) remotely

When I need to troubleshoot a problem in Windows, the first things I ask my customer to provide are...
Reset Windows 10 password by disabling Windows Defender

A simple hack for resetting a Windows 10 password by abusing tools such as Ultiman.exe, StickyKeys, or DisplaySwitch.exe has...
How to access a user’s Windows desktop without knowing their password

When it comes to troubleshooting a running application on a user's Windows desktop, the first problem you face is...
Hacking admin rights on an Autopilot-installed Windows device (Return of the Shift + F10)

In this post, I will reveal a security flaw in Autopilot, Microsoft's new solution to deploy Windows machines to...