We recently talked about how we go about securing the execution of untrusted code on our endpoints by defining a Software Restriction Policy. Once we’ve got this base covered, from a security perspective, we now need to take the next steps towards securing our local systems. Local administrator accounts – the challenges Every Windows system… [ read more ]
Read More …Posts tagged Active Directory:
Complying with NIST Password Guidelines in 2021
“In the beginning, passwords lived in simple times. It was the 60’s when we first saw them used to authenticate to computer systems and it was a time where physical presence was required. Nobody was remote, nobody was dialling in and there was certainly nobody connecting over the web. You walked into a room full… [ read more ]
Read More …Implementing Software Restriction Policy
This article is aims to be a comprehensive guide to creating a secure Software Restriction Policy and is quite a long read – we recommend you bookmark it now so you have it to hand when you need it. Securing your environment is a huge deal these days. Whereas we have all for a very… [ read more ]
Read More …Group Policy Objects: How To Define and Manage Them Properly
Group Policy Objects have been an intrinsic part of any Active Directory deployment since they came along with Windows 2000. But given that they have been around for such a long time, it is common to find GPO implementations that are not in the best state of repair. In this article, we will cover some quick and easy ways to try and get back on top of them.
Read More …Finding Pwned Passwords in Active Directory
There are plenty of different ways to hunt for pwned passwords in Active Directory. This complete guide walks through each approach, pros and cons and some quicker alternatives.
Read More …