In an era dominated by technological advancements, the rise of cyber threats poses a substantial risk to businesses and individuals alike. One such threat is EvilGinx, a sophisticated man-in-the-middle software…
Get ACL Permissions for a specific OU
# Get ACL Permissions for a specific OU (Get-ACL "AD:$((Get-ADOrganizationalUnit -Identity 'OU=Computers,DC=Test,DC=LOCAL').distinguishedname)").access | Select IdentityReference,AccessControlType,ActiveDirectoryRights.IsInherited #Other examples available from https://www.easy365manager.com/how-to-document-ou-delegation/ https://shellgeek.com/get-ad-ou-permissions-report/
Query Active Directory – Security Script
PowerShell script to query active directory : Identify Accounts with Password expiring is disabled Identify Accounts have not logged on for 30 or 90 days and accounts have never logged…
Purview – eDiscovery, and Investigations – How to guide
Create a Case - eDiscovery (Standard) - Microsoft Purview You will require the role eDiscovery Manager or eDiscovery Administrator Assign eDiscovery permissions in the Microsoft Purview compliance portal - Microsoft…
Microsoft SC-200 Security Operations Analyst – Study Notes
Defender for Identity entity tags in Microsoft 365 Defender https://docs.microsoft.com/en-us/defender-for-identity/manage-sensitive-honeytoken-accounts Using role-based access control (RBAC) https://docs.microsoft.com/en-us/learn/modules/deploy-microsoft-defender-for-endpoints-environment/4-manage-access Manage portal access using role-based access control https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/rbac?view=o365-worldwide Safe Attachments policies in Microsoft Defender…
NIST Cyber Security Professional.. things to remember
Digital Transformation + Cyber Security = Success Digital Transformation. What to focus on: Customer Experience -> Operational Efficiencies -> New Revenue Streams -> Rapid Response to Change What is NIST-CSF…
Azure Conditional Access Integration with Google Chrome
Scenario: Anyone using MCAS, Conditional Access, Window 10 Endpoints and Google Chrome. Challenge: How do you get Google Chrome to be recognised by Azure Conditional Access policies. Issue : Azure…
VMware Horizon and Zero Clients Enabling Rapid Remote Secure IT Working
2020, the year where the country went into lock down. In the UK we were told to work from home. This got me thinking more about options for rapid deployment…
Security Is a Hugely Strategic Area For VMware:…
Video discussion about VMware and their recent acquisition, security company Octarine. #Security #VMware #OctarineSecurity Is a Hugely Strategic Area For VMware:...VMware recently acquired yet another security company Octarine. The acquisition…
Microsoft Azure Security – Study Notes
A collection of all my study notes and lab work while working towards passing the badge Microsoft Certified Security Engineer Associate by passing the AZ-500 exam These notes are in…