If your server initiates connections to an unknown host, it might be a sign that your server has been...
Hysolate Free for Sensitive Access: Run sensitive activities in an isolated workspace

An overview of Hysolate Free for Sensitive Access, which provides a secure environment for accessing sensitive data and services.
Manage security baselines and compliance policies using Intune

Security baselines are groups of preconfigured Windows settings that are recommended by Microsoft. Compliance policies configure rules and settings...
Block the installation of USB devices on Windows PCs using Intune

Managing end user device security settings is an integral part of an organization's overall cybersecurity. Microsoft 365 Intune provides...
Passwork: An easy-to use password manager for the enterprise

Passwork password manager is a simple yet robust password management solution for the enterprise.
ManageEngine Endpoint Security Suite: Patch management, device control, and vulnerability scanning

Learn how to manage on-premises and remote worker security patching, application, and device control, as well as vulnerability scanning...
Disable NetBIOS in Windows networks

NetBIOS was initially created to allow applications to communicate without understanding the details of the network, including error recovery....
Reset a Windows 11 password and the Windows Server 2022 administrator password

Recently, Microsoft released Windows Server 2022 and Windows 11 in Insider Preview. Today, we will see whether the old...
Restrict installation of (USB) devices using Group Policy

The various removable storage media, which can be connected to a PC via plug-and-play, pose a risk of data...
Securden’s new Unified Privileged Access Management

Privileged Access Management is increasingly important with the rise of account compromise and the resulting data breaches. Securden’s new...
How to reset an Active Directory password with PowerShell

Active Directory (AD) account password reset is a common task for support personnel. In this post, we will take...
How to migrate Active Directory Certificate Services to SHA-2 and Key Storage Provider

Businesses need to migrate from the deprecated SHA-1 to SHA-2 to bolster their cybersecurity posture. They may still be...
Migrating AD certificate services to SHA-2: Considerations and challenges

Secure Hash Algorithm (SHA) has been around since the mid-90s and is one of the leading cryptographic hash algorithms...
Deploying Windows Hello for Business

Anyone who has purchased a Windows device from Microsoft or several other vendors in the last few years might...
Assign NTFS permissions using Group Policy

You can use group policies to set access rights to directories or files for multiple computers. They not only...
Provide strong Windows authentication using virtual smart cards

Virtual smart cards provide the benefits of physical smart cards without extra costs or hardware. They are based on...
AdvancedRun, NSudo: Run programs as SYSTEM or Trusted Installer using free tools

Running programs as SYSTEM or Trusted Installer may be needed by administrators. We look at a couple of free...
Secure DNS requests over HTTPS (DoH) in Windows 10/11

DNS over HTTPS (DoH) is a security feature that safeguards the authenticity of DNS servers and hides requests from...
Manage encrypted PCs remotely using BitLocker Network Unlock

TPM+PIN decryption with BitLocker requires physical access to the device when the endpoint boots or resumes from sleep. This...
A popular topic in security circles these days is preventing lateral movement. Network segregation for admin tasks, or what...