Have you been pwned? The new compromised credentials protection feature of Enzoic for Active Directory allows you to monitor...
Turn on Windows 10 Tamper Protection for Microsoft Defender

When hackers gain access to a computer, one of their first goals is to disable the system's security mechanisms....
Safe browsing with a ReCoBS server

Setting up a remote-controlled browser system (ReCoBS) is one way to create a safe browsing environment for your end...
Runecast 6.1: Issue policy for IT security and compliance auditing

Issuing a security and compliance auditing policy across on-premises and multi- and hybrid cloud environments can be a challenge....
Windows security event log backup to SQL Server Express with PowerShell

My ADSecurityLogArchivingManager PowerShell module is a custom monitoring data retrieval tool that allows you to export security event logs...
Sync passwords with KeePass to OneDrive, Google Drive, and Dropbox

KeePass is an open-source password manager used to house passwords and other information. However, using modern cloud storage and...
Secure RDP connections using Remote Credential Guard

The transmission of credentials over the network offers attackers the opportunity to hijack a user's identity. This is especially...
Prevent ransomware attacks on network shares with File Server Resource Manager (FSRM)

Every week, it seems that another company becomes the victim of a coordinated ransomware attack. While several companies offer...
Remote Desktop Manager with Devolutions Server: Managing secure privileged access

Learn how to use Devolutions Remote Desktop Manager and Devolutions Server together for secure privileged access management.
Configure protection against potentially unwanted apps using PowerShell or Group Policy

Potentially unwanted applications (PUAs) are software apps that do things that border on malicious activity. These can include displaying...
Block brute force Remote Desktop attacks with Windows PowerShell

The Windows PowerShell script I introduce here detects brute force Remote Desktop attacks and blocks them in the Windows...
Exploiting the CVE-2021-42278 (sAMAccountName spoofing) and CVE-2021-42287 (deceiving the KDC) Active Directory vulnerabilities

After Microsoft released security patches for two Active Directory vulnerabilities with the Tuesday, November 9, 2021 patch, Microsoft urged...
Permanently delete a Key Vault in Azure using PowerShell

In this post, we will be looking at purging options to permanently delete a Key Vault and fully erase...
How to use Microsoft Authenticator as a password manager

Microsoft has extended the Authenticator app to store passwords and other data for web-based forms, such as credit card...
Set up a VPN server on Windows with SoftEther and connect clients

SoftEther VPN is an open-source VPN solution that offers a wide range of authentication and connectivity options for multiple...
FileZilla: Migrate settings and connections, read stored passwords

The open-source FTP client FileZilla offers the option of saving connections, including passwords. If you have entered many FTP...
Overview: Microsoft’s security portfolio under the Defender brand

Azure-named services provide an indication of Azure functionality and capabilities, even if these services provide hybrid cloud features and...
Root login via SSH and SFTP on EC2 instances running Linux

If you try to connect to an EC2 instance with the user root, you will receive this error message: Please...
Perform Active Directory security assessment using PowerShell

My Active Directory security assessment script pulls important security facts from Active Directory and generates nicely viewable reports in...
Protect Active Directory with Microsoft Defender for Identity

Microsoft Defender for Identity is a cloud-based security solution that can identify attack signals in Active Directory. The solution...