How to deploy Sysmon and keep it up to date at all time. Don’t waste your time managing Sysmon, just do this.
Do you want to deploy a script or software quickly via Group Policy? Learn the fastest software or script deployment method in Group Policy.
Many Active Directory attacks’ root vulnerability is the domain’s AD Access Control Lists. This post explains what you need to know about the AD Access Control List to prevent lateral movement and escalation of privileges in the domain.
Dive into the IT professional’s nomadic journey—conquering ergonomic hurdles and fortifying digital defenses. Uncover essential tips for a seamless blend of work, travel, and security. Your IT adventure begins here!
How security hardened are your servers really? Find out the free tools and methods to ensure your environment is NIST standards hardened and compliant!
Are you looking for Client System Hardening Best Practices? Find out how you can test and improve your Windows Client environment security!
Are you defending PowerShell abuse in your network? Find out the PowerShell best practices for preventing abuse.
Looking for a secure way to build Active Directory groups? Learn how to build role-based access controls using security group nesting.
Getting starting in scripting PowerShell? Check out these tips every beginner needs to know.
If you are not using these free tools to secure Active Directory, then you’re an easy target! Find the vulnerabilities lurking in your Active Directory environment before the attackers do.