The Change Auditor for Logon Activity 7.1 update allows for auditing of Kerberos and NTLM authentications to promote better security and compliance. Learn more.
In the third and final part of this Active Directory security issues series, we take a look at the problems with Groups and Operating Systems (OSs). Learn more.
Elastic stack demonstrated itself as a leader for open source big data analysis, data collection, and visualization products. The stack which is usually abbreviated with ELK contains the following components
Elastic search - data indexing and analys…
Quest InTrust is a very powerful log management framework which also contains a lot of possible ways to notify about triggered alerts:
Email alertsSCOM connectorAlert Reports in SRS
Alerts in SQL DB
Web Interface for Alert management - InTru...
When Active Directory (AD) goes down, it’s the same as the electricity going off – productivity stops. Active Directory is the single authoritative source of users within your organizations and controls access to mission-critical business...
It is well known for anyone who tried to run a VM in the cloud that RDP port if left opened will be attacked with massive waves of brute-force attempts from IPs all around the world.
I run a detection lab in Azure and at some point, it just started t…
Today we live in a fast-moving world. Mergers and acquisitions are occurring at a record pace. Impacts of the recent pandemic are only likely to increase this trend. Over the past several years many companies have made the move to Office 365 for thei…
This blog post will outline the CISA alert, prior CISA advice for securing Office 365 and point you to a TEC Talk by Microsoft Certified Master Sean Metcalf (@PyroTek3) that addresses the 10 (and more) Azure AD and Office 365 security tasks to do now…