Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Use Microsoft Copilot for Security: Complete eGuide to Generative AI for Cybersecurity

In the constantly evolving world of cybersecurity, defense teams need all the resources they can get to keep up. Fortunately, the massive advances in generative AI present SOC teams with a powerful set of tools to optimize security practices and match even fully automated adversaries using natural language input. Microsoft Security Copilot is among the most advanced examples of these tools.

Connect to Exchange Online PowerShell

Exchange Online PowerShell is a command-line management interface for administering and automating tasks in Exchange Online, which is a part of Microsoft 365. It allows administrators to manage user mailboxes, configure organizational settings, and perform bulk operations efficiently through scripting. Here are some benefits of using PowerShell for Exchange Online management.

PowerShell Grep Command

Grep (Global Regular Expression print) command is a powerful text searching utility in Unix/Linux systems. Grep takes a pattern such as a regular expression or string and searches one or more input files for the lines that contain the expected pattern. Grep command can be significantly used for text searching and filtering, log analysis, code scanning, configuration management, data extraction etc.

Understanding NTLM and Kerberos: Key Differences and Use Cases

Connecting all your company resources in a network for sharing is valuable, but you need a way to verify that only authorized users and devices can access these resources. Authentication serves this purpose by providing methods for users and devices to prove their identity. In Windows environments, two main authentication protocols are used: NTLM (New Technology LAN Manager) and Kerberos. In this article we will discuss NTLM vs Kerberos and show why it is important to implement Kerberos if possible.

Identity Threat Detection & Response: Protecting Active Directory - Crown Jewel of IT Infrastructure

Your Directory Is Your Crown Jewel; hence, it needs to be Protected at All Costs! If attackers wipe out your Active Directory, recovery could take months, not weeks. Incidents like the Maersk ransomware attack and Ukraine’s border wipeout highlight the devastating effects of directory breaches. Destructive wiper attacks are now 5x more common than before.

Cyber Shields Up: Defending Your Data & Identities with Data Security Posture Management

In today’s evolving threat landscape, protecting your data and identities is more critical than ever. In this snippet from an expert-led session, Netwrix specialists Adam Laub and Jeff Warren explore how Data Security Posture Management (DSPM) and a layered defense strategy can strengthen your cybersecurity approach. You’ll learn how to: Whether you're focused on compliance, identity protection, or data exposure mitigation, this webinar offers actionable insights and practical use cases to help you build a more resilient security framework.

Identity Threat Detection and Response: Proactive and Reactive Measures

Know What You Have, Secure What You Know What’s the most critical cybersecurity control today? It’s not MFA or segmentation—it’s up-to-date hardware & software inventory management. Security experts agree that You can’t protect what you don’t know exists.

AS-REP Roasting Attack Explained | Real-Life Active Directory Exploit Demo

What is AS-REP Roasting? AS-REP Roasting is an attack that exploits misconfigured Active Directory accounts with disabled Kerberos pre-authentication. Attackers can retrieve password hashes and crack them with minimal effort, leading to unauthorized access. Watch This Real-World Attack Demo Jon Obst, Director of Research at Netwrix, demonstrates: How to Prevent AS-REP Roasting Protect your organization with proactive security controls.

Identity Threat Detection and Response: Practical Strategies for Protection

The Key to Protecting Your Directory Separating privileges is one of the most effective ways to stop cyberattacks from spreading. Proper security controls are needed at every level, from domain admins to workstation admins. But overcomplicated setups can actually do more harm than good. Learn how to build a practical, effective tiering model to secure your organization, without unnecessary complexity.

Mastering Error Handling in PowerShell with Try-Catch-Finally

Many PowerShell scripts are designed to run unattended, so it is vital to ensure that they can handle errors smoothly. Proper error handling helps prevent a wide variety of issues, from incomplete operations and system downtime to data loss. Error handling needs to account for both terminating errors, which stop script execution, and non-terminating errors, which allow the script to continue running but can affect the output.

How to Defend Against Pass-the-Ticket Attacks: Stop PC Hacking Techniques in Active Directory

Discover how cybercriminals exploit the Pass-the-Ticket attack to breach critical systems—and learn how to defend against it! In this cybersecurity tutorial, Jon Obst, Director of R&D at Netwrix Corporation, demonstrates this advanced Active Directory hacking technique. See how attackers use PC hacking techniques to steal user tickets without passwords, enabling lateral movement, privilege escalation, and data theft.

A Basic Guide to SQL Server Security Fundamentals

Organizations today collect and generate enormous volumes of sensitive data. Much of it is stored in SQL Server databases, making SQL Server security management crucial for protecting critical applications and services. Implementing strong Microsoft SQL Server security measures helps organizations defend against cyber threats and comply with regulations like GDPR, HIPAA, and PCI DSS.

GSEC vs. CompTIA Security - Certification Comparison

Cybersecurity professionals play an increasingly crucial role in protecting sensitive information and securing networks against evolving threats. Cybersecurity certifications validate an individual’s knowledge and skills, enhancing career prospects and credibility in the field. CompTIA Security+ and GIAC Security Essentials (GSEC) are two highly valued certifications: Read on for a detailed comparison of the two certifications to help you determine the right option for your career.

What's Next for Users of Microsoft Identity Manager?

Microsoft Identity Manager (MIM) has long been a cornerstone of identity and access management for many organizations. It integrates seamlessly with on-premises systems like Active Directory, SAP, Oracle, and other LDAP and SQL platforms to ensure consistent user identities across multiple environments. However, with Microsoft’s focus shifting toward cloud-first solutions like Entra ID, MIM’s mainstream support has ended and extended support will end in just a few years (2029).

Mastering PowerShell Loops: A Complete Guide for System Automation

PowerShell is a cross-platform command-line shell and scripting language designed for system administrators. PowerShell commands can be combined into scripts to automate repetitive tasks and process large datasets effectively. Loops play an important role in scripting by providing a structured way to execute a block of code multiple times.