Protecting Local Credentials with LAPS
One of the most significant issues faced in a Microsoft Windows environment is the ability to steal credentials and utilize these credentials to move throughout the network laterally.
Dan Franciscus is a systems engineer and VMware Certified Professional (VCP) specializing in VMware, PowerShell, and other Microsoft-based technologies. You can reach Dan at his blog (http://www.winsysblog.com/) or Twitter at @dan_franciscus.
One of the most significant issues faced in a Microsoft Windows environment is the ability to steal credentials and utilize these credentials to move throughout the network laterally.
Adversaries can utilize MITM attacks to steal credentials, even when they are protected by SSL.
One of the best ways to protect your servers and workstations from malware is to limit the execution of untrusted files.
Dan Franciscus | | IT Insights
For many Microsoft IT professionals, one of the first things they do with PowerShell is using it to perform tasks in Active Directory.
Dan Franciscus | | IT Insights
In this article, Dan Franciscus covers how to use the Invoke-Command and why it is one of his favorite commands to use in PowerShell.
Dan Franciscus | | IT Insights | Security
The process of securely installing software in Windows is something that IT professionals grapple with, especially in an enterprise setting.
Dan Franciscus | | IT Insights
In enterprise environments, you will usually find an array of different Windows operating systems, hardware and of course software. Typically, machines are managed and configured with group policy and SCCM, or perhaps other more modern methods like Chef or Puppet. One of...
Dan Franciscus | | IT Insights
Recently at the Microsoft Build conference, it was announced that there is a new Windows terminal that can be used as an alternative to cmd of PowerShell, called Windows Terminal.
Dan Franciscus | | IT Insights | Security
In this article, we discuss how to grant users simple admin rights temporarily like installing software. This helps keep IT from getting bogged down.
A pass the hash attack is a common attack vector utilized by many adversaries. In this attack, a Windows username is paired with the hashed value of a Windows account password. Let's take a deeper look.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.