If you get a chance you may briefly look at old articles related to this topic as I will be briefly referencing them or quickly summarizing portions of my configuration…. [Continue Reading]
Category: Security
Monitoring Domain Group Membership Changes
I encountered a scenario at work where I had to monitor any changes performed on an account’s active directory membership groups on a daily/weekly basis. I believe there may be… [Continue Reading]
Chrome Extensions: Bypassing your security
At this point you have tightened up your environment by removing local administrator rights, keeping up your software up-to-date, blocking 3rd party software download sites, etc. etc…; however, you start… [Continue Reading]
Security Awareness Training: Step-By-Step
If you find yourself responding to daily incidents such as having to remove adware from a system, or having to run a powershell script to delete user emails because of… [Continue Reading]
Critical Control # 2: Inventory of Authorized and Unauthorized Software
You can’t control what you can’t see Do you have a list of approved and trusted applications in your environment? Are you sure? What about those 3rd party add-ons that… [Continue Reading]