Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Anonymous User Security for Everyday Users

Windows permits an anonymous user to carry out specific actions, such as listing the names of domain accounts and network shares. This functionality proves useful in scenarios when an administrator needs to provide access to users in a trusted domain lacking a reciprocal trust agreement. By default, the Everyone security identifier(SID) is excluded from the token generated for anonymous connections. Consequently, permissions assigned to the Everyone group don’t extend to anonymous users.

Hardened Baseline Configuration using CIS Baseline Tools

Hardened Baseline Configuration is a crucial aspect of system security for cybersecurity experts and the risk management teams. The secure baseline configuration represents a set of security controls that have been carefully selected and implemented to provide a robust general level of system hardening. There isn’t a one-size-fits-all solution, and specific configurations will vary depending on the type of system (server, desktop, etc.), role and its intended use.

CIS Benchmarks - What are They and How to Use Them

The CIS Benchmarks cover a collection of recommended hardening policies specifying different hosts, applications, and operating systems that include detailed recommendations on system configuration, security settings, and other measures that can help organizations safeguard their IT infrastructure against a wide range of cyber threats. The benchmarks cover various platforms and technologies such as operating systems, cloud environments, databases, web browsers, and mobile devices.

DCOM Hardening: Best Practices for DCOM Windows Security

The distribution of component object models across different computers is called Distributed Component Object Model (DCOM). DCOM in Windows means an object of the client program can request services from objects on the server program on other computers within the same network. DCOM can also be implemented on a majority of UNIX platforms and aids communication among software components across different computers within a wide area network, local area network(LAN), or over the internet.

RDP Hardening and Hardening RDS Essential Guide

Windows Remote Desktop Service(RDS) in Microsoft Windows allows users to control a remote computer or virtual machine over a network using the Remote Desktop Protocol (RDP). To secure this access, it’s crucial to implement strong passwords to prevent brute force attacks and unauthorized access.

GPO Hardening and GPO Hack Prevention: Essential Strategies

Group Policies are part of every Active Directory. Group Policy (GP) is designed to be able to change every system's configurations, from the least to the most privileged layer. Since it is so fundamental in the network management process, it is also very powerful for attackers to use as an attack vector. Therefore, GPO hardening is necessary to ensure that these policies are secure and not easily exploited by attackers, protecting the integrity and security of the entire network.

Windows Hardening Guide: 10 Key Stages for Cyber Resilience

Best practices for mitigating various attack vectors are changing depending on the environment and server functionality. CIS baselines cover most of the relevant scenarios by addressing the first stage of your Hardening Windows Server project. CIS Benchmarks -What are They and How to Use Them Microsoft has been doing some work related to default security configuration, but there is still a big gap between security best practices (i.e. common benchmarks) and the default Windows configuration.

Understanding Access Control Entry and Types

Access Control Entry (ACE) is data within an access control list detailing the access privileges assigned to an individual user or a collective group of users. In the Access Control Entry system, an identification (ID) distinguishes each ACE and identifies the specific individual or group of subjects. Each access control entry includes: An Access Control List (ACL) is similar to an organized list of rules that determine who can do what.

Windows 11 Boosts Security: NTLM Out, Kerberos In

Microsoft’s initiative to phase out NTLM authentication in favor of the more secure Kerberos protocol was originally announced back in October 2023. At that time, the Windows maker declared its intention to deprecate NTLM and encourage organizations to transition to Kerberos for authentication purposes across its ecosystem. Microsoft announced this week that later this year they are expecting to retire NTLM authentication in Windows 11.

User Account Control Settings Hardening Guide (2024)

User Account Control (UAC) serves as a security feature in Windows, aiming to safeguard the operating system from unauthorized modifications. Whenever alterations demand administrator-level permissions, UAC prompts the user, allowing them to either authorize or reject the requested change. User Account Control (UAC) provides several benefits, especially in maintaining security and minimizing risks associated with administrative privilege.