Tel Aviv, Israel
Sep 18, 2022   |  By John Gates
In February 2022, Center for Internet Security (CIS) released the Microsoft Windows Server 2022 Benchmark v1.0.0 that provides prescriptive guidance for establishing a secure configuration posture for Microsoft Windows. CIS have said about the benchmark, “This secure configuration guide is based on Microsoft Windows Server 2022 (Release 21H2) and is intended for all versions of Microsoft Windows Server 2022 operating system, including older versions.
Sep 17, 2022   |  By John Gates
The Department of Homeland Security (DHS) on September 16, 2022 announced a first-of-its-kind cybersecurity grant program specifically for state, local, and territorial (SLT) governments across the country with funding in the amount of $200 million for Fiscal Year (FY) 2022, $400 million for FY 2023, $300 million for FY 2024, and $100 million for FY 2025.
Sep 5, 2022   |  By John Gates
UNC (Universal Naming Convention) identifies servers, printers, and other resources in the UNIX/Windows Community. The name of a computer is anteceded in a UNC path by double slashes or backslashes. Local disk or directories UNC paths are separated by a single slash or backslash.
Aug 22, 2022   |  By John Gates
A safe and secure environment is prioritized by every type of organization and configuring some basic Group Policy Settings properly, can help in achieving this task. Also, by using Group Policies correctly a user’s computer can be protected from threats and breaches.
Aug 1, 2022   |  By John Gates
In this article we’ll cover what is SAM (Security Accounts Manager) and its related policy in the Network Access domain “Do not allow anonymous enumeration of SAM accounts”. The values, vulnerability, and security recommendations of this policy.
Jul 28, 2022   |  By John Gates
The Security Accounts Manager (SAM) is a database file in Windows operating system that comprises of usernames and passwords. The main aim behind SAM is to make our system more secure and reliable by protecting credentials in case of a data breach. Configuring SAM gives users the ability to authenticate themselves to the local machine if an account has been created for them in security accounts manager.
Jul 25, 2022   |  By John Gates
Transport Layer Security is a security protocol used for facilitating seamless and safe communication between servers and web browsers. Put it his way, TLS encrypts data so that only the intended recipient and the sender can access it. Currently, TLS 1.2 and TLS 1.3 are the most commonly used TLS versions. After some major upgrades, TLS’s 1.3 version has emerged as one of the most extensively used and the safest security protocols for websites that need a high-end encryption service.
Jul 6, 2022   |  By John Gates
In February 2022, CIS (Center for Internet Security) released the Microsoft Windows Server 2022 Benchmark v1.0.0 that includes 50+ new features, GPOs (Group Policy Objects), capabilities and services. The document offers a comparison between Server 2019 vs. Server 2022 for similarities and differences as well as similarities and differences of Windows 11 vs Windows 10.
Jun 22, 2022   |  By John Gates
The National Security Agency (NSA) and partner cybersecurity authorities recently released an information sheet recommending proper configuration and monitoring of PowerShell, as opposed to removing or disabling PowerShell entirely. PowerShell is a built-in scripting language and a command-line executor developed by Microsoft to provide a better interface for system administrators to simplify and automate administrative tasks.
Jun 20, 2022   |  By John Gates
In March 2022, PCI DSS launched a 4.0 version, which sets the operational and security standards for users. This new version is the replacement for the 3.2.1 variant. The authorities have upgraded the version to enhance security measures and help individuals and businesses handle growing security threats seamlessly. Financial companies have been sending feedback for the inefficient payment systems, due to which the PCI DSS launched a new security version PCI-DSS v4.0.
May 26, 2021   |  By CalCom
May 6, 2021   |  By CalCom
Access this computer from the network - best practices for DC and Member Server
Apr 13, 2021   |  By CalCom
This policy setting determines whether the LDAP server requires LDAP clients to negotiate data signing. Using the default configuration of this value allows LDAP clients to communicate with Active Directory in an insecure fashion.
Apr 8, 2021   |  By CalCom
Server hardening is a bigger challenge today than ever before. When infrastructure becomes more and more complex, it is impossible to achieve compliance using manual tools to harden servers. CalCom offers an automated solution for server hardening for easy policy enforcement and maximum compliance.
Apr 4, 2021   |  By CalCom
Auditing Kerberos service ticket operations is important for detecting hackers trying to use Kerberos as an attack vector. The default value of this configuration is to audit only successful events. This may eventually result in missing an attack or not having enough information to investigate it.
Mar 16, 2021   |  By CalCom
This video will discuss the recommended setting for Symbolic Links in your servers, since as much as they are useful, Symbolic Links can also be used maliciously to gain access and control in your network.
Feb 12, 2020   |  By CalCom
This policy specifies whether to prevent the redirection of data to client LPT ports during a Remote Desktop Services session. You can use this setting to prevent users from mapping local LPT ports and redirecting data from the remote computer to local LPT port peripherals. If a value is configured to Disabled or Not Configured, the attacker can leverage it to map the client’s LPT ports. In addition, he can use the port to redirect data from the Terminal Server to the local LTP ports.
Jan 13, 2020   |  By CalCom
Do Not Allow COM Port Redirection will determine whether the redirection of data to client COM ports from the remote computer will be allowed in the RDS session. By default, RDS allows COM port redirection. It can be used, for example, to use a USB dongle in an RDS session.
Dec 25, 2019   |  By CalCom
NTLM is Microsoft’s old mythological authentication protocol. Although new and better authentication protocol has already been developed, NTLM is still very much in use. NTLM protocol has proven to have many flaws that result in potential vulnerabilities. One caution measure that can be taken is auditing and logging any NTLM traffic events.

CalCom Hardening Solution (CHS) is the ideal choice for IT Ops & CISOs looking to create a secured configured infrastructure.

CHS is a flexible hardening tool, with the unique ability to ‘learn’ where desired hardening changes will adversely impact production activity. CHS determines the impact of baseline changes before they implemented, producing visible conclusions for decision-makers. CHS eliminates time-consuming lab testing, reduces the cost and impact of hardening, and centering infrastructure control, thereby stopping security breaches and operational mistakes.

How Can CalCom Hardening Suite Make a Huge Difference In Server Hardening:

  • Cost effective server hardening process: Save time and resources required for testing security policies in lab environments.
  • Zero server outages: Ensure that production services are not harmed during server hardening.
  • Prevent & monitor unauthorized policy changes: Stop security breaches and operational mistakes before they happen.

Make Your Hardening Project Effortless.