My first attempt at a logger was for short term. It became apparent quite quickly that this wouldn’t be a long standing solution to avoid the log analytics costs………………….
Tag: microsoft
The not so isolated risk of legacy systems
Unfortunately, in today’s world, it is not just Vladimir Putin running Windows XP. Many continue to run the risk of… Read more The not so isolated risk of legacy systems
Bypass AzureAD Administration Portal Restriction
The security of active directory will always be a hot topic. AD contains all your identities/structure and isn’t something you want anyone accessing. In traditional models, a common threat was that your users could query AD using net /domain commands…..
Microsoft Azure: Securing Public RDP
Security professionals have been trying to flag the risks of public facing RDP for years. Despite all the news articles and tweets, the volume of public RDP remains high…..
Why Control PowerShell In Azure
PowerShell brings automation and automation can be key to running an environment. The problem is, if it isn’t controlled, “automation” can be used against you……
Finding Access Anywhere Servers Using Certificates
Remote users are a part of every organization and the need to provide external access can be a real problem. For the bigger organizations, they will most likely implement several security controls in order to isolate their users from the rest of the internet.
For some, they may want to go for the cheaper option to provide remote access……
How Company Branding Could Help Protect Your Microsoft Credentials.
Phishing isn’t something new. In fact, today, it’s one of the most common forms of cybercrime. Although we are all… Read more How Company Branding Could Help Protect Your Microsoft Credentials.