Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to

How to record, log and audit any Microsoft Hyper-V, VMware Horizon, and Citrix session with EKRAN

Ekran System® can help you to organize virtual desktop monitoring and user session recording in environments like VMware Horizon, Microsoft Hyper-V, or Citrix. In addition to Citrix session recording, Ekran System delivers a comprehensive set of identity and access management features, real-time alerting, and incident response tool sets.

RDS: Do Not Allow LPT Port Redirection

This policy specifies whether to prevent the redirection of data to client LPT ports during a Remote Desktop Services session. You can use this setting to prevent users from mapping local LPT ports and redirecting data from the remote computer to local LPT port peripherals. If a value is configured to Disabled or Not Configured, the attacker can leverage it to map the client’s LPT ports. In addition, he can use the port to redirect data from the Terminal Server to the local LTP ports.

Why is a disaster recovery plan important?

JUMPSEC Jargon Buster - Nikoo explains why a disaster recovery plan is important? Business Continuity Plans and Disaster Recovery plans are two key elements of the ISO27000 series of standards. Disaster recovery plans allow organisations to plan in advance what to do in the event of a serious interruption to business-as-usual, by having robust plans made in advance, it reduces the potential business impact of an interruption and helps restore operations quickly. the process and details of this plan are essentials for stopping disasters from occurring in the first place.

What is the difference between a Vulnerability Assessment & a Penetration Test?

JUMPSEC Jargon Buster - What is the difference between a Vulnerability Assessment & a Penetration Test, Thom explains. Vulnerability assessments typically rely on vulnerability scanning tools to identify technical vulnerabilities making use of pre-configured test cases and signatures. A penetration test takes a contextual view of the target, combining many vulnerabilities and information sources in order to craft specific attacks with the goal of finding security weaknesses. Simply put a penetration test mimiks a skilled attacker, whereas a vulnerability assessment provides a baseline against common known weaknesses.

How does Red Teaming differ from a Penetration Test?

JUMPSEC Jargon Buster - Nikoo explains how Red Teaming differs from a Penetration Test. There are a number of ways that a red teaming exercise differentiate from a pen test. Firstly, the scope of standard penetration test is usually clearly defined with the goal to identify as many vulnerabilities as possible and attempt to exploit them on the stated targets during the engagement.

RDS: Do Not Allow COM Port Redirection- The Policy Expert

Do Not Allow COM Port Redirection will determine whether the redirection of data to client COM ports from the remote computer will be allowed in the RDS session. By default, RDS allows COM port redirection. It can be used, for example, to use a USB dongle in an RDS session.