You can configure various settings for BitLocker using group policies, but this doesn't initiate encryption. Similarly, it doesn't create...
Tag Archive for: security
4sysops - The online community for SysAdmins and DevOps
Manage enhanced security mode in Microsoft Edge using Group Policy

Enhanced security mode (ESM) introduced with Edge 111 is designed to protect the browser against attacks that manipulate data...
Find compromised passwords in Active Directory with Have I Been Pwned

Given that Active Directory logins still primarily rely on usernames and passwords, it's crucial to use secure passwords. However,...
Encrypt Kubernetes Secrets at rest

In a previous post, you learned that Kubernetes Secrets are not really secure by default; that is, they are...
The permissions on the certificate template do not allow the current user to enroll for this type of certificate

When requesting an SSL certificate from Active Directory Certificate Services, the process may fail due to a lack of...
How to a create a Kubernetes Secret

A Kubernetes Secret is a resource that is used to store sensitive information, such as passwords, authentication tokens, API...
Export certificate as CER, DER, P7B, or PFX

When transferring a certificate to another computer, it is common practice to export it from the cert store and...
SanerNow: Detect security anomalies

SanerNow's Continuous Posture Anomaly Management (CPAM) allows you to detect misconfigurations and security anomalies using machine learning and deep...
Amazon Inspector: AWS security monitoring

Discover Amazon Inspector, an AWS security monitoring service that provides automated security scans for EC2 instances, AWS Lambda, and...
TPM, PIN, Passwords, and SID: Managing BitLocker Key Protectors

BitLocker uses symmetric encryption methods to encrypt drives. The key used for this is protected by two encryption layers....
Secure BitLocker key with a PIN

By default, BitLocker is configured to release the volume master key (VMK) solely through the TPM. However, this might...
Windows file auditing and ransomware protection with PA File Sight

An in-depth look at PA File Sight's Windows file auditing and ransomware protection features, their importance, and their role...
Configure password managers in Chrome, Edge, and Firefox using Group Policy

All modern web browsers offer password managers that allow users to save website login credentials and automatically fill them...
Enable Windows LAPS with Azure AD

Windows Local Administrator Password Solution (Windows LAPS) is a built-in Windows feature that enables the management and rotation of...
setspn: Manage service principal names in Active Directory from the command line

Learn how to use the setspn command line tool to manage service principal names in Active Directory and properly...
Check the BitLocker status of all PCs in the network

The built-in tools for activating BitLocker do not provide a comprehensive report on the encryption status of the entire...
Avoid BitLocker recovery mode by customizing the TPM validation profile

On startup, BitLocker ensures that the configuration of a PC has not changed since encryption began. For this purpose,...
SQL Server Always Encrypted

Microsoft SQL Server Always Encrypted is a feature that protects confidential data by encrypting it at the column level....
Spectre: A password manager that doesn’t store passwords

Password managers are not without security flaws, as seen in a recent high-profile breach. The database storing all the...
How to block emails in Outlook and Microsoft 365 (Office 365)

In this article, we will discuss how to block emails in Outlook and in the Outlook Web App and...